Sciweavers

960 search results - page 175 / 192
» Computational Semantics Of Mass Terms
Sort
View
ICS
2011
Tsinghua U.
12 years 11 months ago
Hystor: making the best use of solid state drives in high performance storage systems
With the fast technical improvement, flash memory based Solid State Drives (SSDs) are becoming an important part of the computer storage hierarchy to significantly improve perfo...
Feng Chen, David A. Koufaty, Xiaodong Zhang
VEE
2005
ACM
174views Virtualization» more  VEE 2005»
14 years 1 months ago
PDS: a virtual execution environment for software deployment
The Progressive Deployment System (PDS) is a virtual execution environment and infrastructure designed specifically for deploying software, or “assets”, on demand while enabli...
Bowen Alpern, Joshua S. Auerbach, Vasanth Bala, Th...
MM
2004
ACM
97views Multimedia» more  MM 2004»
14 years 1 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
PLDI
2003
ACM
14 years 28 days ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
SACMAT
2010
ACM
14 years 15 days ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam