Sciweavers

2513 search results - page 345 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
WETICE
2005
IEEE
15 years 6 months ago
Transparent Remote File Access in the Minimum Intrusion Grid
This paper describes the implementation of a thin user-level layer to be installed on Grid resources. The layer fits in the Minimum intrusion Grid design by imposing as few requi...
Rasmus Andersen, Brian Vinter
ICWE
2005
Springer
15 years 6 months ago
An Application Framework for Collaborative Learning
We present the design of a new web application framework for collaborative learning. The framework guides users (i.e. teachers) in implementing online activities based on well-know...
Aiman Turani, Rafael A. Calvo, Peter Goodyear
87
Voted
PPOPP
2009
ACM
16 years 1 months ago
Committing conflicting transactions in an STM
Dependence-aware transactional memory (DATM) is a recently proposed model for increasing concurrency of memory transactions without complicating their interface. DATM manages depe...
Hany E. Ramadan, Indrajit Roy, Maurice Herlihy, Em...
CGO
2003
IEEE
15 years 6 months ago
Addressing Mode Selection
Many processor architectures provide a set of addressing modes in their address generation units. For example DSPs (digital signal processors) have powerful addressing modes for e...
Erik Eckstein, Bernhard Scholz
POPL
2010
ACM
15 years 10 months ago
Toward a Verified Relational Database Management System
We report on our experience implementing a lightweight, fully verified relational database management system (RDBMS). The functional specification of RDBMS behavior, RDBMS impleme...
Avraham Shinnar, Greg Morrisett, J. Gregory Malech...