Sciweavers

135 search results - page 17 / 27
» On Implementing High Level Concurrency in Java
Sort
View
ESORICS
2000
Springer
14 years 18 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ICEIS
2009
IEEE
14 years 3 months ago
MIDAS: A Middleware for Information Systems with QoS Concerns
One of the most difficult tasks in the design of information systems is how to control the behaviour of the back-end storage engine, usually a relational database. As the load on t...
Luís Fernando Orleans, Geraldo Zimbrã...
CASES
2007
ACM
14 years 1 months ago
A self-maintained memory module supporting DMM
The memory intensive nature of object-oriented languages such as C++ and Java has created the need of a high-performance dynamic memory management (DMM); however, it is a challeng...
Weixing Ji, Feng Shi, Baojun Qiao
FCCM
2009
IEEE
190views VLSI» more  FCCM 2009»
14 years 3 months ago
Optical Flow on the Ambric Massively Parallel Processor Array (MPPA)
The Ambric Massively Parallel Processor Array (MPPA) is a device that contains 336 32-bit RISC processors and is appropriate for embedded systems due to its relatively small physi...
Brad L. Hutchings, Brent E. Nelson, Stephen West, ...
WOA
2003
13 years 10 months ago
An Integrated Resource Management Architecture for Wireless Smart Environments
— Pervasive and ubiquitous computing is enabling the implementation of “smart environments”, i.e., environments where applications support and enhance the abilities of their ...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi