Sciweavers

757 search results - page 51 / 152
» Composing Security-Aware Software
Sort
View
121
Voted
AMAST
2000
Springer
15 years 7 months ago
Meta Languages in Algebraic Compilers
Abstract. Algebraic compilers provide a powerful and convenient mechanism for specifying language translators. With each source language operation one associates a computation for ...
Eric Van Wyk
ICALP
1999
Springer
15 years 7 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli
125
Voted
PODC
2010
ACM
15 years 6 months ago
Transactional predication: high-performance concurrent sets and maps for STM
Concurrent collection classes are widely used in multi-threaded programming, but they provide atomicity only for a fixed set of operations. Software transactional memory (STM) pr...
Nathan Grasso Bronson, Jared Casper, Hassan Chafi,...
123
Voted
EUROMICRO
2009
IEEE
15 years 6 months ago
Composition of Self Descriptive Protocols for Future Network Architectures
The network protocols we use today have been introduced decades ago. Since then the whole Internet came to existence and with it a single protocol stack: TCP/IP. What was a good s...
Dennis Schwerdel, Abbas Siddiqui, Bernd Reuther, P...
UIST
1997
ACM
15 years 6 months ago
Systematic Output Modification in a 2D User Interface Toolkit
In this paper we present a simple but general set of techniques for modifying output in a 2D user interface toolkit. We use a combination of simple subclassing, wrapping, and coll...
W. Keith Edwards, Scott E. Hudson, Joshua Marinacc...