Sciweavers

5252 search results - page 948 / 1051
» Logic in Access Control
Sort
View
CCGRID
2006
IEEE
15 years 9 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer
132
Voted
SEUS
2005
IEEE
15 years 9 months ago
Development of Distributed Programming Developing Tool-Kit Based on Object Group Model
In this paper, we defined the concept of the grouped distributed objects[10-14], as a logical unit of distributed application service, and developed a distributed programming deve...
Jeong-Taek Lim, Su-Chong Joo, Chang-Sun Shin
ANCS
2005
ACM
15 years 9 months ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
119
Voted
ISLPED
2005
ACM
90views Hardware» more  ISLPED 2005»
15 years 9 months ago
Power and thermal effects of SRAM vs. Latch-Mux design styles and clock gating choices
This paper studies the impact on energy efficiency and thermal behavior of design style and clock-gating style in queue and array structures. These structures are major sources of...
Yingmin Li, Mark Hempstead, Patrick Mauro, David B...
181
Voted
ESOP
2005
Springer
15 years 9 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow