Sciweavers

1783 search results - page 155 / 357
» Provenance and Data Synchronization
Sort
View
SIGCSE
2009
ACM
137views Education» more  SIGCSE 2009»
16 years 4 months ago
The hidden injuries of overloading 'ADT'
commonly stated definition of abstract data type (ADT) is that it is a domain of values and the operations over that domain. So, for example, a language's built-in types, lik...
Duane Buck, David J. Stucki
PET
2007
Springer
15 years 10 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...
PPOPP
1990
ACM
15 years 8 months ago
Employing Register Channels for the Exploitation of Instruction Level Parallelism
Abstract - A multiprocessor system capable of exploiting fine-grained parallelism must support efficient synchronization and data passing mechanisms. This paper demonstrates the us...
Rajiv Gupta
WDAG
2004
Springer
113views Algorithms» more  WDAG 2004»
15 years 9 months ago
Bounded Version Vectors
Abstract. Version vectors play a central role in update tracking under optimistic distributed systems, allowing the detection of obsolete or inconsistent versions of replicated dat...
José Bacelar Almeida, Paulo Sérgio A...
VL
1994
IEEE
147views Visual Languages» more  VL 1994»
15 years 8 months ago
Role of Visual Languages in Developing Image Analysis Algorithms
Developers of new imageanalysis algorithmstypically require an interactive environment in which the imagedata can be passed through various operators, some of which may involve fe...
M. Stella Atkins, Torre Zuk, B. Johnston, T. Arden