Sciweavers

1448 search results - page 127 / 290
» Restricted Stack Implementations
Sort
View
ENTCS
2007
113views more  ENTCS 2007»
13 years 7 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
BIRTHDAY
2010
Springer
13 years 6 months ago
Towards Declarative Query Scoping in Sensor Networks
Abstract. In the last decade, several large-scale wireless sensor networks have been deployed to monitor a variety of environments. The declarative nature of the database approach ...
Daniel Jacobi, Pablo Ezequiel Guerrero, Khalid Naw...
ICWL
2010
Springer
13 years 5 months ago
An Open Model for Learning Path Construction
Learning path construction is a complex task. It involves formulating and organizing learning activities, defining ways to evaluate student learning progress and to match such prog...
Fan Yang, Frederick W. B. Li, Rynson W. H. Lau
ASPLOS
2009
ACM
14 years 8 months ago
Dynamic prediction of collection yield for managed runtimes
The growth in complexity of modern systems makes it increasingly difficult to extract high-performance. The software stacks for such systems typically consist of multiple layers a...
Michal Wegiel, Chandra Krintz
SENSYS
2009
ACM
14 years 2 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke