Sciweavers

11022 search results - page 2039 / 2205
» Programming Systems for Autonomy
Sort
View
FUIN
2006
97views more  FUIN 2006»
13 years 9 months ago
Thread Algebra with Multi-Level Strategies
In a previous paper, we developed an algebraic theory about threads and multi-threading based on the assumption that a deterministic interleaving strategy determines how threads ar...
Jan A. Bergstra, C. A. Middelburg
IJSC
2008
95views more  IJSC 2008»
13 years 9 months ago
Beyond Information Silos - an Omnipresent Approach to Software Evolution
ifferent abstraction levels, resulting in isolated `information silos'. An increasing number of task-specific software tools aim to support developers, but this often results ...
Juergen Rilling, René Witte, Philipp Sch&uu...
CN
2007
137views more  CN 2007»
13 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ISCA
2008
IEEE
136views Hardware» more  ISCA 2008»
13 years 9 months ago
A Randomized Queueless Algorithm for Breadth-First Search
First Come First Served is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems [28, 11], scheduling web ...
K. Subramani, Kamesh Madduri
IJHPCA
2006
109views more  IJHPCA 2006»
13 years 9 months ago
A Resource Leasing Policy for on-Demand Computing
Leasing computational resources for on-demand computing is now a viable option for providers of network services. Temporary spikes or lulls in demand for a service can be accommod...
Darin England, Jon B. Weissman
« Prev « First page 2039 / 2205 Last » Next »