Sciweavers

3153 search results - page 478 / 631
» Programming the Grid: Component Systems for Distributed Appl...
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 3 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
122
Voted
PEPM
2010
ACM
16 years 19 days ago
Clone detection and elimination for Haskell
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code make...
Christopher Brown, Simon Thompson
173
Voted
ICDE
2012
IEEE
216views Database» more  ICDE 2012»
13 years 6 months ago
Load Balancing in MapReduce Based on Scalable Cardinality Estimates
—MapReduce has emerged as a popular tool for distributed and scalable processing of massive data sets and is increasingly being used in e-science applications. Unfortunately, the...
Benjamin Gufler, Nikolaus Augsten, Angelika Reiser...
152
Voted
HPCN
1997
Springer
15 years 8 months ago
Parallel Solution of Irregular, Sparse Matrix Problems Using High Performance Fortran
For regular, sparse, linear systems, like those derived from regular grids, using High Performance Fortran (HPF) for iterative solvers is straightforward. However, for irregular ma...
Eric de Sturler, Damian Loher
181
Voted
ESOP
2005
Springer
15 years 9 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow