Sciweavers

6907 search results - page 1166 / 1382
» Securing distributed adaptation
Sort
View
ASPLOS
2006
ACM
15 years 5 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
79
Voted
OOPSLA
2005
Springer
15 years 4 months ago
Parametric polymorphism for software component architectures
Parametric polymorphism has become a common feature of mainstream programming languages, but software component architectures have lagged behind and do not support it. We examine ...
Cosmin E. Oancea, Stephen M. Watt
GI
2004
Springer
15 years 4 months ago
Towards a Framework and a Design Methodology for Autonomic Integrated Systems
: The transition from microelectronics to nanoelectronics reaches physical limits and results in a paradigm shift in the design and fabrication of electronic circuits. The conserva...
Andreas Herkersdorf, Wolfgang Rosenstiel
94
Voted
ICALP
2010
Springer
15 years 3 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
OOPSLA
2009
Springer
15 years 3 months ago
Good examples for exposing bad practice: a "killer examples" workshop
The “Killer Examples” series of workshops are highly interactive workshops which have been an annual occurrence at OOPSLA since 2002. The goals of the workshop are to bring to...
Dale Skrien, Michael E. Caspersen, Jürgen B&o...
« Prev « First page 1166 / 1382 Last » Next »