Sciweavers

2958 search results - page 53 / 592
» Extending and Implementing RASP
Sort
View
SACMAT
2004
ACM
14 years 1 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann
PADO
2001
Springer
14 years 2 days ago
Implementing Circularity Using Partial Evaluation
Complex data dependencies can often be expressed concisely by defining a variable in terms of part of its own value. Such a circular reference can be naturally expressed in a lazy...
Julia L. Lawall
ARITH
1999
IEEE
13 years 12 months ago
Intermediate Variable Encodings that Enable Multiplexor-Based Implementations of Two Operand Addition
In two operand addition, bit-wise intermediate variables such as the "propagate" and "generate" terms are defined/evaluated first. Basic carry propagation recu...
Dhananjay S. Phatak, Israel Koren
IPPS
1999
IEEE
13 years 12 months ago
A Customizable Implementation of RMI for High Performance Computing
This paper describes an implementation of Java's Remote Method Invocation RMI that is designed to run on top of the Globus high performance computing protocol. The primary con...
Fabian Breg, Dennis Gannon
FODO
1993
Springer
147views Algorithms» more  FODO 1993»
13 years 11 months ago
Design and Implementation of DDH: A Distributed Dynamic Hashing Algorithm
Abstract. DDH extends the idea of dynamic hashing algorithms to distributed systems. DDH spreads data across multiple servers in a network using a novel autonomous location discove...
Robert Devine