Sciweavers

7047 search results - page 1272 / 1410
» Focusing on Binding and Computation
Sort
View
ICFP
2010
ACM
13 years 11 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
ACMDIS
2010
ACM
13 years 10 months ago
Design from the everyday: continuously evolving, embedded exploratory prototypes
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abound...
Clint Heyer, Margot Brereton
CHI
2010
ACM
13 years 10 months ago
How routine learners can support family coordination
Researchers have detailed the importance of routines in how people live and work, while also cautioning system designers about the importance of people's idiosyncratic behavi...
Scott Davidoff, John Zimmerman, Anind K. Dey
DAC
2010
ACM
13 years 10 months ago
Instruction cache locking using temporal reuse profile
The performance of most embedded systems is critically dependent on the average memory access latency. Improving the cache hit rate can have significant positive impact on the per...
Yun Liang, Tulika Mitra
ICDCS
2010
IEEE
13 years 10 months ago
Complexity Analysis of Weak Multitolerance
—In this paper, we classify multitolerant systems, i.e., systems that tolerate multiple classes of faults and provide potentially different levels of tolerance to them in terms o...
Jingshu Chen, Sandeep Kulkarni
« Prev « First page 1272 / 1410 Last » Next »