Sciweavers

2111 search results - page 277 / 423
» How to Program Pervasive Systems
Sort
View
PADL
2001
Springer
15 years 7 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
108
Voted
CIA
2000
Springer
15 years 7 months ago
Applying Agents to Bioinformatics in GeneWeaver
Recent years have seen dramatic and sustained growth in the amount of genomic data being generated, including in late 1999 the first complete sequence of a human chromosome. The c...
Kevin Bryson, Michael Luck, Mike Joy, David T. Jon...
126
Voted
ICFP
1999
ACM
15 years 6 months ago
Type Dispatch for Named Hierarchical Types
Type dispatch constructs are an important feature of many programming languages. Scheme has predicates for testing the runtime type of a value. Java has a class cast expression an...
Neal Glew
99
Voted
SIGMETRICS
1994
ACM
113views Hardware» more  SIGMETRICS 1994»
15 years 6 months ago
Shade: A Fast Instruction-Set Simulator for Execution Profiling
Shade is an instruction-set simulator and custom trace generator. Application programs are executed and traced under the control of a user-supplied trace analyzer. To reduce commu...
Robert F. Cmelik, David Keppel
118
Voted
EUROPAR
2006
Springer
15 years 6 months ago
Toward a Definition of and Linguistic Support for Partial Quiescence
Abstract. The global quiescence of a distributed computation (or distributed termination detection) is an important problem. Some concurrent programming languages and systems provi...
Billy Yan-Kit Man, Hiu Ning (Angela) Chan, Andrew ...