Sciweavers

3330 search results - page 401 / 666
» software 2010
Sort
View
WOSP
2010
ACM
15 years 11 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...
CBSE
2010
Springer
15 years 9 months ago
Comparison of Component Frameworks for Real-Time Embedded Systems
Abstract. The usage of components brings significant help in development of real-time embedded systems. There have been a number of component frameworks developed for this purpose...
Petr Hosek, Tomás Pop, Tomás Bures, ...

Publication
148views
15 years 6 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
FUNGAMES
2010
15 years 3 months ago
panOULU conqueror: pervasive location-aware multiplayer game for city-wide wireless network
We present the design, implementation and evaluation of a novel pervasive location-aware multiplayer game. In the game teams of players try to score points by conquering the real-...
Juha Tiensyrjä, Timo Ojala, Toni Hakanen, Oss...
SOCO
2010
Springer
15 years 3 months ago
Evolving the memory of a criminal's face: methods to search a face space more effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Melanie Pitchford, ...