Sciweavers

2362 search results - page 437 / 473
» Programming in Standard ML
Sort
View
ICS
2010
Tsinghua U.
15 years 7 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
EUROSYS
2007
ACM
15 years 6 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso
ICCD
2006
IEEE
86views Hardware» more  ICCD 2006»
15 years 6 months ago
Interconnect Matching Design Rule Inferring and Optimization through Correlation Extraction
— New back-end design for manufacturability rules have brought guarantee rules for interconnect matching. These rules indicate a certain capacitance matching guarantee given spac...
Rasit Onur Topaloglu, Andrew B. Kahng
IUI
2009
ACM
15 years 6 months ago
Learning to generalize for complex selection tasks
Selection tasks are common in modern computer interfaces: we are often required to select a set of files, emails, data entries, and the like. File and data browsers have sorting a...
Alan Ritter, Sumit Basu
WWW
2010
ACM
15 years 4 months ago
Automated object persistence for JavaScript
Traditionally web applications have required an internet connection in order to work with data. Browsers have lacked any mechanisms to allow web applications to operate offline wi...
Brett Cannon, Eric Wohlstadter