Sciweavers

1079 search results - page 130 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
FLAIRS
2006
13 years 10 months ago
Supporting Systematic Usage of Context in Web Applications
Context can be seen as a paradigm aiming to improve user interaction with software. For Web applications in particular, the issues of content explosion and technological constrain...
J. Wolfgang Kaltz, Jürgen Ziegler
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 2 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
VLSISP
2008
100views more  VLSISP 2008»
13 years 9 months ago
Memory-constrained Block Processing for DSP Software Optimization
Digital signal processing (DSP) applications involve processing long streams of input data. It is important to take into account this form of processing when implementing embedded ...
Ming-Yung Ko, Chung-Ching Shen, Shuvra S. Bhattach...
ICFP
2008
ACM
14 years 9 months ago
Efficient nondestructive equality checking for trees and graphs
The Revised6 Report on Scheme requires its generic equivalence predicate, equal?, to terminate even on cyclic inputs. While the terminating equal? can be implemented via a DFA-equ...
Michael D. Adams, R. Kent Dybvig
USENIX
1996
13 years 10 months ago
Transparent Fault Tolerance for Parallel Applications on Networks of Workstations
This paper describes a new method for providingtransparent fault tolerance for parallel applications on a network of workstations. We have designed our method in the context of sh...
Daniel J. Scales, Monica S. Lam