Sciweavers

5962 search results - page 931 / 1193
» Working with Patterns and Code
Sort
View
HPCA
2006
IEEE
16 years 5 months ago
The common case transactional behavior of multithreaded programs
Transactional memory (TM) provides an easy-to-use and high-performance parallel programming model for the upcoming chip-multiprocessor systems. Several researchers have proposed a...
JaeWoong Chung, Hassan Chafi, Chi Cao Minh, Austen...
CADE
2008
Springer
16 years 5 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
16 years 4 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
ICSE
2003
IEEE-ACM
16 years 4 months ago
Whole Program Path-Based Dynamic Impact Analysis
Impact analysis, determining when a change in one part of a program affects other parts of the program, is timeconsuming and problematic. Impact analysis is rarely used to predict...
James Law, Gregg Rothermel
129
Voted
ICSE
2007
IEEE-ACM
16 years 4 months ago
Information Needs in Collocated Software Development Teams
Previous research has documented the fragmented nature of software development work, with frequent interruptions and coordination. To explain this in more detail, we analyzed soft...
Andrew J. Ko, Robert DeLine, Gina Venolia