Sciweavers

3500 search results - page 37 / 700
» Implementing Java on Clusters
Sort
View
ACSAC
2004
IEEE
14 years 24 days ago
.NET Security: Lessons Learned and Missed from Java
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
DAGSTUHL
2001
13 years 10 months ago
JaVis: A UML-Based Visualization and Debugging Environment for Concurrent Java Programs
Debugging concurrent Java programs is a difficult task because of multiple control flows and inherent nondeterminism. It requires techniques not provided by traditional debuggers ...
Katharina Mehner
COMPSEC
2006
141views more  COMPSEC 2006»
13 years 9 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
CONCURRENCY
1998
119views more  CONCURRENCY 1998»
13 years 8 months ago
C to Java: Converting Pointers into References
We consider the problem of converting C pointers to the less flexible concept of references. Our main application is converting scientific applications from C to Java. We provid...
Erik D. Demaine
LCTRTS
2004
Springer
14 years 2 months ago
Advanced control flow in Java card programming
Java Card technology simplifies the development of smart card applications by providing a high-level programming language similar to Java. However, the master-slave programming m...
Peng Li, Steve Zdancewic