Sciweavers

10539 search results - page 2014 / 2108
» On L
Sort
View
CL
2010
Springer
13 years 10 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
CCR
2008
120views more  CCR 2008»
13 years 10 months ago
OpenFlow: enabling innovation in campus networks
This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an interna...
Nick McKeown, Tom Anderson, Hari Balakrishnan, Gur...
CGF
2008
118views more  CGF 2008»
13 years 10 months ago
Exploratory Visualization of Animal Kinematics Using Instantaneous Helical Axes
We present novel visual and interactive techniques for exploratory visualization of animal kinematics using instantaneous helical axes (IHAs). The helical axis has been used in or...
Daniel F. Keefe, Trevor M. O'Brien, D. B. Baier, S...
CN
2008
80views more  CN 2008»
13 years 10 months ago
Practical large-scale latency estimation
We present the implementation of a large-scale latency estimation system based on GNP and incorporated into the Google content delivery network. Our implementation does not rely o...
Michal Szymaniak, David L. Presotto, Guillaume Pie...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 10 months ago
Window-Based Greedy Contention Management for Transactional Memory
r of Abstraction (invited lecture) . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Barbara Liskov Fast Asynchronous Consensus with Optimal Resilience. . . . . . . . . . . ....
Gokarna Sharma, Brett Estrade, Costas Busch
« Prev « First page 2014 / 2108 Last » Next »