Sciweavers

446 search results - page 81 / 90
» Some Issues in Design of Distributed Deductive Databases
Sort
View
POPL
2008
ACM
15 years 12 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
95
Voted
IEEEPACT
2003
IEEE
15 years 5 months ago
The Impact of Resource Partitioning on SMT Processors
Simultaneous multithreading (SMT) increases processor throughput by multiplexing resources among several threads. Despite the commercial availability of SMT processors, several as...
Steven E. Raasch, Steven K. Reinhardt
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
16 years 2 days ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
ASPLOS
2006
ACM
15 years 5 months ago
Type inference for unboxed types and first class mutability
Systems programs rely on fine-grain control of data representation and use of state to achieve performance, conformance to hardware specification, and temporal predictability. T...
Swaroop Sridhar, Jonathan S. Shapiro
JIT
2004
Springer
131views Database» more  JIT 2004»
15 years 5 months ago
Testing of Service-Oriented Architectures - A Practical Approach
Service Oriented Architectures (SOAs) have recently emerged as a new promising paradigm for supporting distributed computing. Web services, as well as integration-packages relying ...
Schahram Dustdar, Stephan Haslinger