Sciweavers

1448 search results - page 260 / 290
» Restricted Stack Implementations
Sort
View
IEPOL
2010
102views more  IEPOL 2010»
13 years 6 months ago
An antitrust analysis of the case for wireless network neutrality
The ongoing debate about possible implementation of regulatory rules requiring “network neutrality” for wireless telecommunications services is inherently about whether to imp...
Gregory L. Rosston, Michael D. Topper
OOPSLA
2010
Springer
13 years 6 months ago
Ownership and immutability in generic Java
The Java language lacks the important notions of ownership (an object owns its representation to prevent unwanted aliasing) and immutability (the division into mutable, immutable,...
Yoav Zibin, Alex Potanin, Paley Li, Mahmood Ali, M...
VRST
2010
ACM
13 years 5 months ago
An adaptive training-free feature tracker for mobile phones
While tracking technologies based on fiducial markers have dominated the development of Augmented Reality (AR) applications for almost a decade, various real-time capable approach...
Jan Herling, Wolfgang Broll
HIPC
2009
Springer
13 years 5 months ago
Comparing the performance of clusters, Hadoop, and Active Disks on microarray correlation computations
Abstract--Microarray-based comparative genomic hybridization (aCGH) offers an increasingly fine-grained method for detecting copy number variations in DNA. These copy number variat...
Jeffrey A. Delmerico, Nathanial A. Byrnes, Andrew ...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...