Sciweavers

310 search results - page 46 / 62
» Progressive fractal coding
Sort
View
ESOP
2005
Springer
14 years 3 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
SC
2004
ACM
14 years 3 months ago
Will Moore's Law Be Sufficient?
—It seems well understood that supercomputer simulation is an enabler for scientific discoveries, weapons, and other activities of value to society. It also seems widely believed...
Erik DeBenedictis
LCTRTS
2004
Springer
14 years 3 months ago
Asynchronous software thread integration for efficient software
Existing software thread integration (STI) methods provide synchronous thread progress within integrated functions. For the remaining, non-integrated portions of the secondary (or...
Nagendra J. Kumar, Siddhartha Shivshankar, Alexand...
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
14 years 4 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
COMPSAC
2005
IEEE
14 years 3 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho