Sciweavers

750 search results - page 73 / 150
» Program Chair's Message
Sort
View
ACSAC
2010
IEEE
13 years 8 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
ICFP
2008
ACM
14 years 10 months ago
Transactional events for ML
Transactional events (TE) are an approach to concurrent programming that enriches the first-class synchronous message-passing of Concurrent ML (CML) with a combinator that allows ...
Laura Effinger-Dean, Matthew Kehrt, Dan Grossman
JAVA
1999
Springer
14 years 2 months ago
Interfacing Java to the Virtual Interface Architecture
User-level network interfaces (UNIs) have reduced the overheads of communication by exposing the buffers used by the network interface DMA engine to the applications. This removes...
Chi-Chao Chang, Thorsten von Eicken

Book
392views
15 years 8 months ago
Squeak by Example
"The book helps you get started with A Quick Tour of Squeak and guides you through A First Application. The Smalltalk language is introduced in three chapters on Syntax in a N...
Andrew P. Black, Stéphane Ducasse, Oscar Nierstra...
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
14 years 5 months ago
Exploration of Cultural Influences on Business and IT Alignment
Aligning IT to business needs is still one of the most important concerns for senior management. The message of Business and IT Alignment (BIA) is logical and undisputed, but impl...
A. J. Gilbert Silvius, Steven De Haes, Wim Van Gre...