Sciweavers

1777 search results - page 306 / 356
» Programming Cryptographic Protocols
Sort
View
SENSYS
2009
ACM
14 years 3 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke
SMALLTALK
2007
Springer
14 years 2 months ago
Transactional memory for smalltalk
Concurrency control in Smalltalk is based on locks and is therefore notoriously difficult to use. Even though some implementations provide high-level constructs, these add complexi...
Lukas Renggli, Oscar Nierstrasz
VL
2002
IEEE
124views Visual Languages» more  VL 2002»
14 years 1 months ago
Supporting the Construction of Real World Interfaces
In recent years, real world objects have been used to reflect information previously shown on the computer screen. While most earlier efforts have required significant developer...
D. Scott McCrickard, David Wrighton, Dillon Busser...
BMCBI
2004
196views more  BMCBI 2004»
13 years 8 months ago
MUSCLE: a multiple sequence alignment method with reduced time and space complexity
Background: In a previous paper, we introduced MUSCLE, a new program for creating multiple alignments of protein sequences, giving a brief summary of the algorithm and showing MUS...
Robert C. Edgar
ANCS
2011
ACM
12 years 8 months ago
ReClick - A Modular Dataplane Design Framework for FPGA-Based Network Virtualization
Network virtualization has emerged as a powerful technique to deploy novel services and experimental protocols over shared network infrastructures. Although recent research has hi...
Deepak Unnikrishnan, Justin Lu, Lixin Gao, Russell...