Sciweavers

3872 search results - page 420 / 775
» The Java memory model
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
Finding bugs efficiently with a SAT solver
We present an approach for checking code against rich specifications, based on existing work that consists of encoding the program in a relational logic and using a constraint sol...
Julian Dolby, Mandana Vaziri, Frank Tip
ISCA
2007
IEEE
145views Hardware» more  ISCA 2007»
15 years 11 months ago
Mechanisms for store-wait-free multiprocessors
Store misses cause significant delays in shared-memory multiprocessors because of limited store buffering and ordering constraints required for proper synchronization. Today, prog...
Thomas F. Wenisch, Anastassia Ailamaki, Babak Fals...
WWW
2010
ACM
15 years 12 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
PADS
2000
ACM
15 years 9 months ago
Distributed, parallel simulation of multiple, deliberative agents
Multi-agent systems comprise multiple, deliberative agents embedded in and recreating patterns of interactions. Each agent’s execution consumes considerable storage and calculat...
Adelinde Uhrmacher, K. Gugler
GEOINFO
2004
15 years 6 months ago
Towards a Web Service for Geographic and Multidimensional Processing
: A lot of research has been developed for integrating the analysis functionality that is available in both analytic and geographic processing systems. The main goal is to provide ...
Joel da Silva, Valéria Cesário Times...