Sciweavers

13383 search results - page 2494 / 2677
» Abstractions from proofs
Sort
View
ISSTA
2009
ACM
14 years 5 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis
SIGMETRICS
2009
ACM
126views Hardware» more  SIGMETRICS 2009»
14 years 5 months ago
Self-adaptive admission control policies for resource-sharing systems
We consider the problem of admission control in resource sharing systems, such as web servers and transaction processing systems, when the job size distribution has high variabili...
Varun Gupta, Mor Harchol-Balter
SMA
2009
ACM
117views Solid Modeling» more  SMA 2009»
14 years 5 months ago
Discrete physics using metrized chains
Over the last fifty years, there have been numerous efforts to develop from first principles a comprehensive discrete formulation of geometric physics, including Whitney’s ge...
Antonio DiCarlo, Franco Milicchio, Alberto Paoluzz...
SOUPS
2009
ACM
14 years 5 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
ASPLOS
2010
ACM
14 years 5 months ago
A real system evaluation of hardware atomicity for software speculation
In this paper we evaluate the atomic region compiler abstraction by incorporating it into a commercial system. We find that atomic regions are simple and intuitive to integrate i...
Naveen Neelakantam, David R. Ditzel, Craig B. Zill...
« Prev « First page 2494 / 2677 Last » Next »