Sciweavers

168 search results - page 22 / 34
» Making Applications Persistent at Run-time
Sort
View
SIGMOD
2000
ACM
165views Database» more  SIGMOD 2000»
14 years 2 months ago
Finding Generalized Projected Clusters In High Dimensional Spaces
High dimensional data has always been a challenge for clustering algorithms because of the inherent sparsity of the points. Recent research results indicate that in high dimension...
Charu C. Aggarwal, Philip S. Yu
C++
1994
78views more  C++ 1994»
13 years 11 months ago
A Poor Man's Approach to Dynamic Invocation of C++ Member Functions
During the last year we built several solutions for opening our ET++ applications for internal and external scripting. The most annoying part to be coded manually was the code stu...
Thomas Kofler, Bruno Schäffer, André W...
TCS
2010
13 years 8 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
IEEEIAS
2008
IEEE
14 years 4 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
ICDCS
2007
IEEE
14 years 4 months ago
Automated Storage Reclamation Using Temporal Importance Annotations
This work focuses on scenarios that require the storage of large amounts of data. Such systems require the ability to either continuously increase the storage space or reclaim spa...
Surendar Chandra, Ashish Gehani, Xuwen Yu