Sciweavers

800 search results - page 104 / 160
» XML access control using static analysis
Sort
View
129
Voted
COMCOM
2004
112views more  COMCOM 2004»
15 years 3 months ago
Design and analysis of optimal adaptive de-jitter buffers
In order to transfer voice or some other application requiring real-time delivery over a packet network, we need a de-jitter buffer to eliminate delay jitters. An important design...
Gagan L. Choudhury, Robert G. Cole
141
Voted
SACMAT
2009
ACM
15 years 10 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
POPL
2006
ACM
16 years 3 months ago
Associating synchronization constraints with data in an object-oriented language
Concurrency-related bugs may happen when multiple threads access shared data and interleave in ways that do not correspond to any sequential execution. Their absence is not guaran...
Mandana Vaziri, Frank Tip, Julian Dolby
JAVA
2001
Springer
15 years 7 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...
128
Voted
TAPSOFT
1995
Springer
15 years 7 months ago
Comparing Flow-Based Binding-Time Analyses
Abstract. Binding-time analyses based on flow analysis have been presented by Bondorf, Consel, Bondorf and Jørgensen, and Schwartzbach and the present author. The analyses are fo...
Jens Palsberg