Sciweavers

2261 search results - page 322 / 453
» Dynamic types for authentication
Sort
View
OOPSLA
2010
Springer
13 years 7 months ago
Cross-language, type-safe, and transparent object sharing for co-located managed runtimes
As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, object-oriented (OO) programming langua...
Michal Wegiel, Chandra Krintz
JSAC
2011
136views more  JSAC 2011»
12 years 12 months ago
Spectrum Trading in Cognitive Radio Networks: A Contract-Theoretic Modeling Approach
—Cognitive radio is a promising paradigm to achieve efficient utilization of spectrum resource by allowing the unlicensed users (i.e., secondary users, SUs) to access the licens...
Lin Gao, Xinbing Wang, Youyun Xu, Qian Zhang
ECCV
2002
Springer
14 years 10 months ago
Assorted Pixels: Multi-sampled Imaging with Structural Models
Abstract. Multi-sampled imaging is a general framework for using pixels on an image detector to simultaneously sample multiple dimensions of imaging (space, time, spectrum, brightn...
Shree K. Nayar, Srinivasa G. Narasimhan
PLDI
2009
ACM
14 years 9 months ago
Semantics-aware trace analysis
As computer systems continue to become more powerful and comdo programs. High-level abstractions introduced to deal with complexity in large programs, while simplifying human reas...
Kevin J. Hoffman, Patrick Eugster, Suresh Jagannat...
ICPPW
2009
IEEE
14 years 3 months ago
SenSORCER: A Framework for Managing Sensor-Federated Networks
—Despite many technology advances, the limited computing power of sensors encumber them from taking part in service-oriented architectures. In recent years, the sensornetworking ...
Sujit Bhosale, Michael W. Sobolewski