Sciweavers

1748 search results - page 226 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
139
Voted
DAGSTUHL
1996
15 years 3 months ago
A Uniform Approach for Compile-Time and Run-Time Specialization
As partial evaluation gets more mature, it is now possible to use this program transformation technique to tackle realistic languages and real-size application programs. However, t...
Charles Consel, Luke Hornof, François No&eu...
IPPS
2008
IEEE
15 years 9 months ago
A transparent non-invasive file data model for algorithmic skeletons
A file data model for algorithmic skeletons is proposed, focusing on transparency and efficiency. Algorithmic skeletons correspond to a high-level programming model that takes a...
Denis Caromel, Mario Leyton
HPDC
1996
IEEE
15 years 6 months ago
Legion - A View from 50, 000 Feet
' The coming of giga-bit networks makes possible the realization ofa single nationwide virtual computer comprised of a variety of geographically distributed highpe6ormance mac...
Andrew S. Grimshaw, William A. Wulf
NIPS
2008
15 years 3 months ago
Breaking Audio CAPTCHAs
CAPTCHAs are computer-generated tests that humans can pass but current computer systems cannot. CAPTCHAs provide a method for automatically distinguishing a human from a computer ...
Jennifer Tam, Jirí Simsa, Sean Hyde, Luis v...
140
Voted
WOSS
2004
ACM
15 years 8 months ago
Instrumentation in software dynamic translators for self-managed systems
Self-managed software requires monitoring and code changes to an executing program. One technology that enables such self management is software dynamic translation (SDT), which a...
Naveen Kumar, Jonathan Misurda, Bruce R. Childers,...