Sciweavers

5790 search results - page 111 / 1158
» Distributed programming with distributed authorization
Sort
View
IPAW
2010
13 years 8 months ago
Data Provenance in Distributed Propagator Networks
Abstract. The heterogeneous and unreliable nature of distributed systems has created a distinct need for the inclusion of provenance within their design to allow for error correcti...
Ian Jacobi
OOPSLA
2004
Springer
14 years 3 months ago
The garbage collection advantage: improving program locality
As improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors ...
Xianglong Huang, Stephen M. Blackburn, Kathryn S. ...
DAC
2003
ACM
14 years 11 months ago
Behavioral consistency of C and verilog programs using bounded model checking
We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the circuit and the program ...
Edmund M. Clarke, Daniel Kroening, Karen Yorav
DOCENG
2008
ACM
13 years 12 months ago
A concise XML binding framework facilitates practical object-oriented document engineering
Semantic web researchers tend to assume that XML Schema and OWL-S are the correct means for representing the types, structure, and semantics of XML data used for documents and int...
Andruid Kerne, Zachary O. Toups, Blake Dworaczyk, ...
DOA
2000
102views more  DOA 2000»
13 years 11 months ago
Distributed Xbean Applications
XML has emerged as the universal standard for exchanging and externalizing data. Software products of all kinds are being upgraded to "support XML." Typically this means...
Bruce E. Martin