Sciweavers

1815 search results - page 182 / 363
» Cloud Computing: An Overview
Sort
View
LCN
1995
IEEE
15 years 8 months ago
Interconnection of FDDI-II networks through an ATM backbone - An analysis
The waiting tame and queue length characteristics of isochronous, synchronous and asynchronous traffic at the gateway between FDDI-11 and A T M networks are analyzed. A generalize...
Ramanagopal V. Vogety, Yashwant K. Malaiya, Anura ...
98
Voted
HCI
2007
15 years 6 months ago
Kitchen of the Future and Applications
A kitchen is a place where food is prepared and education and communication activities relating to food are carried out. As it is a place that witnesses more activity when compared...
Itiro Siio, Reiko Hamada, Noyuri Mima
DAGSTUHL
2001
15 years 6 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
ECEASST
2008
82views more  ECEASST 2008»
15 years 4 months ago
Interaction nets: programming language design and implementation
: This paper presents a compiler for interaction nets, which, just like term rewriting systems, are user-definable rewrite systems which offer the ability to specify and program. I...
Abubakar Hassan, Ian Mackie, Shinya Sato
SIGCSE
2008
ACM
116views Education» more  SIGCSE 2008»
15 years 4 months ago
Evaluating a breadth-first cs 1 for scientists
This paper presents a thorough evaluation of CS for Scientists, a CS 1 course designed to provide future scientists with an overview of the discipline. The course takes a breadth-...
Zachary Dodds, Ran Libeskind-Hadas, Christine Alva...