Sciweavers

386 search results - page 46 / 78
» Providing Fine-grained Access Control for Java Programs
Sort
View
123
Voted
ECOOP
2008
Springer
15 years 3 months ago
Safe Cross-Language Inheritance
Inheritance is a standard means for reuse and for interfacing with external libraries. In a multi-language software product, extending a class written in a statically-typed languag...
Kathryn E. Gray
123
Voted
FOSSACS
2001
Springer
15 years 6 months ago
On Garbage and Program Logic
Garbage collection relieves the programmer of the burden of managing dynamically allocated memory, by providing an automatic way to reclaim unneeded storage. This eliminates or les...
Cristiano Calcagno, Peter W. O'Hearn
93
Voted
EUROPAR
2006
Springer
15 years 5 months ago
A One-Stop, Fire-and-(Almost)Forget, Dropping-Off and Rendezvous Point
In order to foster uptake by scientific and business users we need an easy way to access Grid resources. This is the motivation for the A-WARE project. We build upon a fabric layer...
Roger Menday, Björn Hagemeier, Bernd Schuller...
129
Voted
MICRO
2010
IEEE
242views Hardware» more  MICRO 2010»
14 years 11 months ago
ASF: AMD64 Extension for Lock-Free Data Structures and Transactional Memory
Advanced Synchronization Facility (ASF) is an AMD64 hardware extension for lock-free data structures and transactional memory. It provides a speculative region that atomically exec...
Jae-Woong Chung, Luke Yen, Stephan Diestelhorst, M...
125
Voted
POPL
2000
ACM
15 years 5 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith