Sciweavers

2482 search results - page 50 / 497
» Characterizing Programming Systems Allowing Program Self-ref...
Sort
View
CN
2000
76views more  CN 2000»
13 years 7 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
ISCA
1993
IEEE
125views Hardware» more  ISCA 1993»
14 years 4 days ago
Evaluation of Mechanisms for Fine-Grained Parallel Programs in the J-Machine and the CM-5
er uses an abstract machine approach to compare the mechanisms of two parallel machines: the J-Machine and the CM-5. High-level parallel programs are translated by a single optimi...
Ellen Spertus, Seth Copen Goldstein, Klaus E. Scha...
CC
2001
Springer
13 years 11 months ago
Points-to and Side-Effect Analyses for Programs Built with Precompiled Libraries
Large programs are typically built from separate modules. Traditional whole-program analysis cannot be used in the context of such modular development. In this paper we consider an...
Atanas Rountev, Barbara G. Ryder
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
13 years 9 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
CONCURRENCY
1998
115views more  CONCURRENCY 1998»
13 years 7 months ago
Falcon: On-line monitoring for steering parallel programs
Abstract Advances in high performance computing, communications, and user interfaces enable developers to construct increasingly interactive high performance applications. The Falc...
Weiming Gu, Greg Eisenhauer, Karsten Schwan, Jeffr...