Sciweavers

124 search results - page 23 / 25
» A Module System for Isolating Untrusted Software Extensions
Sort
View
DOLAP
2005
ACM
13 years 10 months ago
Applying MDA to the development of data warehouses
Different modeling approaches have been proposed to overcome every design pitfall of the development of the different parts of a data warehouse (DW) system. However, they are all ...
Jose-Norberto Mazón, Juan Trujillo, Manuel ...
SIGCPR
1999
ACM
105views Hardware» more  SIGCPR 1999»
14 years 25 days ago
A university-based approach to the diffusion of knowledge management concepts and practice
This paper addresses the diffusion of Knowledge Management concepts, principles, and cases into university courses. Although we are now living in a world of gigabit transmission s...
Stephen Ruth, Jeffrey Theobald, Virgil Frizzell
HIPEAC
2009
Springer
14 years 3 months ago
Collective Optimization
Abstract. Iterative compilation is an efficient approach to optimize programs on rapidly evolving hardware, but it is still only scarcely used in practice due to a necessity to gat...
Grigori Fursin, Olivier Temam
ICFP
2005
ACM
14 years 8 months ago
An expressive language of signatures
Current languages allow a programmer to describe an interface only by enumerating its parts, possibly including other interfaces wholesale. Such languages cannot express relations...
Norman Ramsey, Kathleen Fisher, Paul Govereau
CORR
2011
Springer
197views Education» more  CORR 2011»
13 years 9 days ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania