Sciweavers

446 search results - page 71 / 90
» An approach to safe object sharing
Sort
View
PLDI
2006
ACM
14 years 2 months ago
Optimizing memory transactions
Atomic blocks allow programmers to delimit sections of code as ‘atomic’, leaving the language’s implementation to enforce atomicity. Existing work has shown how to implement...
Timothy L. Harris, Mark Plesko, Avraham Shinnar, D...
POPL
2006
ACM
14 years 9 months ago
Associating synchronization constraints with data in an object-oriented language
Concurrency-related bugs may happen when multiple threads access shared data and interleave in ways that do not correspond to any sequential execution. Their absence is not guaran...
Mandana Vaziri, Frank Tip, Julian Dolby
SGAI
2007
Springer
14 years 2 months ago
Frequent Set Meta Mining: Towards Multi-Agent Data Mining
In this paper we describe the concept of Meta ARM in the context of its objectives and challenges and go on to describe and analyse a number of potential solutions. Meta ARM is de...
Kamal Ali Albashiri, Frans Coenen, Robert Sanderso...
SAC
2005
ACM
14 years 2 months ago
Realizing the leasing concept in CORBA-based applications
Although in recent years the concept of leasing has become more and more popular in the field of distributed object-oriented systems, it has not yet been incorporated in the curre...
Markus Aleksy, Axel Korthaus, Martin Schader
IWDW
2005
Springer
14 years 2 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...