Sciweavers

212 search results - page 28 / 43
» A Certified Implementation on Top of the Java Virtual Machin...
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
14 years 1 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
JTRES
2009
ACM
14 years 2 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
ICDE
2012
IEEE
267views Database» more  ICDE 2012»
11 years 10 months ago
Scalable and Numerically Stable Descriptive Statistics in SystemML
—With the exponential growth in the amount of data that is being generated in recent years, there is a pressing need for applying machine learning algorithms to large data sets. ...
Yuanyuan Tian, Shirish Tatikonda, Berthold Reinwal...
ESORICS
2006
Springer
13 years 11 months ago
Discretionary Capability Confinement
Motivated by the need of application-level access control in dynamically extensible systems, this work proposes a static annotation system for modeling capabilies in a Java-like pr...
Philip W. L. Fong