Sciweavers

87 search results - page 3 / 18
» The Relation of Version Control to Concurrent Programming
Sort
View
91
Voted
POPL
2000
ACM
15 years 1 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
72
Voted
JLP
2011
106views more  JLP 2011»
14 years 10 days ago
Concurrent Kleene Algebra and its Foundations
A Concurrent Kleene Algebra offers two composition operators, related by a weak version of an exchange law: when applied in a trace model of program semantics, one of them stands...
Tony Hoare, Bernhard Möller, Georg Struth, Ia...
RTAS
1999
IEEE
15 years 1 months ago
MIRROR: A State-Conscious Concurrency Control Protocol for Replicated Real-Time Databases
Data replication can help database systems meet the stringent temporal constraints of current time-critical applications, especially Internet-based services. A prerequisite, howev...
Ming Xiong, Krithi Ramamritham, Jayant R. Haritsa,...
FAST
2009
14 years 7 months ago
Causality-Based Versioning
Versioning file systems provide the ability to recover from a variety of failures, including file corruption, virus and worm infestations, and user mistakes. However, using versio...
Kiran-Kumar Muniswamy-Reddy, David A. Holland
ICFP
2007
ACM
15 years 9 months ago
Relating complexity and precision in control flow analysis
We analyze the computational complexity of kCFA, a hierarchy of control flow analyses that determine which functions may be applied at a given call-site. This hierarchy specifies ...
David Van Horn, Harry G. Mairson