Sciweavers

2555 search results - page 480 / 511
» Quantifiers and Working Memory
Sort
View
SOUPS
2005
ACM
15 years 3 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
ECOOP
2005
Springer
15 years 3 months ago
Sharing the Runtime Representation of Classes Across Class Loaders
One of the most distinctive features of the JavaT M programming language is the ability to specify class loading policies. Despite the popularity of class loaders, little has been ...
Laurent Daynès, Grzegorz Czajkowski
EMSOFT
2005
Springer
15 years 3 months ago
Compiler-guided register reliability improvement against soft errors
With the scaling of technology, transient errors caused by external particle strikes have become a critical challenge for microprocessor design. As embedded processors are widely ...
Jun Yan, Wei Zhang
LCPC
2005
Springer
15 years 3 months ago
Automatic Measurement of Instruction Cache Capacity
There is growing interest in autonomic computing systems that can optimize their own behavior on different platforms without manual intervention. Examples of successful self-opti...
Kamen Yotov, Sandra Jackson, Tyler Steele, Keshav ...
LCTRTS
2005
Springer
15 years 3 months ago
Syncopation: generational real-time garbage collection in the metronome
Real-time garbage collection has been shown to be feasible, but for programs with high allocation rates, the utilization achievable is not sufficient for some systems. Since a hi...
David F. Bacon, Perry Cheng, David Grove, Martin T...