Sciweavers

1027 search results - page 172 / 206
» A Model for Java with Wildcards
Sort
View
ICST
2010
IEEE
13 years 7 months ago
Precisely Detecting Runtime Change Interactions for Evolving Software
Abstract—Developers often make multiple changes to software. These changes are introduced to work cooperatively or to accomplish separate goals. However, changes might not intera...
Raúl A. Santelices, Mary Jean Harrold, Ales...
PERCOM
2011
ACM
13 years 5 days ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
PPOPP
2011
ACM
12 years 11 months ago
OoOJava: software out-of-order execution
Developing parallel software using current tools can be challenging. Even experts find it difficult to reason about the use of locks and often accidentally introduce race condit...
James Christopher Jenista, Yong Hun Eom, Brian Dem...
SSD
2005
Springer
145views Database» more  SSD 2005»
14 years 1 months ago
High Performance Multimodal Networks
Networks often form the core of many users’ spatial databases. Networks are used to support the rapid navigation and analysis of linearly connected data such as that found in tra...
Erik G. Hoel, Wee-Liang Heng, Dale Honeycutt
EMSOFT
2004
Springer
14 years 1 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter