Sciweavers

5355 search results - page 980 / 1071
» Modules
Sort
View
ASPLOS
2006
ACM
15 years 8 months ago
Supporting nested transactional memory in logTM
Nested transactional memory (TM) facilitates software composition by letting one module invoke another without either knowing whether the other uses transactions. Closed nested tr...
Michelle J. Moravan, Jayaram Bobba, Kevin E. Moore...
ELPUB
2006
ACM
15 years 8 months ago
An Architecture of Authoring Environments for the Semantic Web
Among the new possibilities that the Semantic Web has enabled, the authoring task is considered as a key moment for semantic representation of knowledge to enhance publishing need...
Edgard Costa Oliveira, Mamede Lima-Marques
MINENET
2006
ACM
15 years 8 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
PLDI
2006
ACM
15 years 8 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
PPPJ
2006
ACM
15 years 8 months ago
Cost and benefit of rigorous decoupling with context-specific interfaces
In Java programs, classes are coupled to each other through the use of typed references. In order to minimize coupling without changing the executed code, interfaces can be introd...
Florian Forster