Sciweavers

685 search results - page 105 / 137
» Closure Operators for Order Structures
Sort
View
FPL
2005
Springer
137views Hardware» more  FPL 2005»
14 years 2 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk
EMSOFT
2004
Springer
14 years 2 months ago
Garbage collection for embedded systems
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
David F. Bacon, Perry Cheng, David Grove
MDM
2004
Springer
113views Communications» more  MDM 2004»
14 years 2 months ago
Meta Data to Support Context Aware Mobile Applications
The greater sophistication and availability of mobile computing devices is enabling the application of computing to new tasks and applications to be experienced in a wide range of...
Dan Chalmers, Naranker Dulay, Morris Sloman
EDOC
2003
IEEE
14 years 2 months ago
MQL: a Powerful Extension to OCL for MOF Queries
The Meta-Object Facility (MOF) provides a standardised framework for object-oriented models. An instance of a MOF model contains objects and links whose interfaces are entirely de...
David Hearnden, Kerry Raymond, Jim Steel
IPPS
2003
IEEE
14 years 2 months ago
Dynamically Loaded Classes as Shared Libraries: An Approach to Improving Virtual Machine Scalability
Sharing selected data structures among virtual machines of a safe language can improve resource utilization of each participating run-time system. The challenge is to determine wh...
Bernard Wong, Grzegorz Czajkowski, Laurent Dayn&eg...