Sciweavers

762 search results - page 112 / 153
» Conditionally correct superoptimization
Sort
View
CSFW
1999
IEEE
14 years 2 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
PODC
1999
ACM
14 years 2 months ago
On k-Set Consensus Problems in Asynchronous Systems
ÐIn this paper, we investigate the k-set consensus problem in asynchronous distributed systems. In this problem, each participating process begins the protocol with an input value...
Roberto De Prisco, Dahlia Malkhi, Michael K. Reite...
SIGGRAPH
1999
ACM
14 years 2 months ago
Pattern-Based Texturing Revisited
We present a texturing method that correctly maps homogeneous non-periodic textures to arbitrary surfaces without any of the difficulties usually encountered using existing tools...
Fabrice Neyret, Marie-Paule Cani
ICDCS
1998
IEEE
14 years 2 months ago
NFS/M: An Open Platform Mobile File System
With the advancement of wireless network and mobile computing, there is an increasing need to build a mobile le system that can perform e ciently and correctly for accessing onlin...
John C. S. Lui, Oldfield K. Y. So, T. S. Tam
LPAR
1999
Springer
14 years 2 months ago
A Partial Evaluation Framework for Curry Programs
In this work, we develop a partial evaluation technique for residuating functional logic programs, which generalize the concurrent computation models for logic programs with delays...
Elvira Albert, María Alpuente, Michael Hanu...