Sciweavers

350 search results - page 64 / 70
» Improving application security with data flow assertions
Sort
View
POPL
2012
ACM
12 years 3 months ago
A compiler and run-time system for network programming languages
Software-defined networks (SDNs) are a new implementation architecture in which a controller machine manages a distributed collection of switches, by instructing them to install ...
Christopher Monsanto, Nate Foster, Rob Harrison, D...
DAC
2000
ACM
14 years 8 months ago
Code compression for low power embedded system design
erse approaches at all levels of abstraction starting from the physical level up to the system level. Experience shows that a highlevel method may have a larger impact since the de...
Haris Lekatsas, Jörg Henkel, Wayne Wolf
JBI
2010
212views Bioinformatics» more  JBI 2010»
13 years 2 months ago
Cloud computing: A new business paradigm for biomedical information sharing
We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called cloud computing. Clou...
Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Sta...
AFRICACRYPT
2010
Springer
14 years 2 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...
HPCA
2004
IEEE
14 years 8 months ago
Out-of-Order Commit Processors
Modern out-of-order processors tolerate long latency memory operations by supporting a large number of inflight instructions. This is particularly useful in numerical applications...
Adrián Cristal, Daniel Ortega, Josep Llosa,...