Sciweavers

386 search results - page 37 / 78
» Providing Fine-grained Access Control for Java Programs
Sort
View
EUROCRYPT
2004
Springer
15 years 7 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
ECLIPSE
2006
ACM
15 years 7 months ago
Generating run-time progress reports for a points-to analysis in Eclipse
Eclipse plug-ins have access to a rich collection of GUI components. One such component is the progress bar, which allows a long-running task to provide Eclipse users with feedbac...
Jason Sawin, Mariana Sharp, Atanas Rountev
78
Voted
IADIS
2003
15 years 3 months ago
Improving Internet Research Methods: A Web Laboratory
We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
Maria Buckley, Carl Vogel
243
Voted
POPL
2009
ACM
16 years 2 months ago
Feedback-directed barrier optimization in a strongly isolated STM
Speed improvements in today's processors have largely been delivered in the form of multiple cores, increasing the importance of ions that ease parallel programming. Software...
Nathan Grasso Bronson, Christos Kozyrakis, Kunle O...
CSCW
1996
ACM
15 years 6 months ago
Supporting Multi-User, Multi-Applet Workspaces in CBE
Our experience with Internet-based scientific collaboratories indicates that they need to be user-extensible, allow users to add tools and objects dynamically to shared workspaces...
Jang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu