Sciweavers

1821 search results - page 296 / 365
» Security-Aware Program Transformations
Sort
View
ICPP
1998
IEEE
14 years 1 months ago
A memory-layout oriented run-time technique for locality optimization
Exploiting locality at run-time is a complementary approach to a compiler approach for those applications with dynamic memory access patterns. This paper proposes a memory-layout ...
Yong Yan, Xiaodong Zhang, Zhao Zhang
CIA
1998
Springer
14 years 1 months ago
Multiagent Systems in Information-Rich Environments
Information-rich environments are the open environments that characterize most of the modern applications of computing technology. The applications include ubiquitous information a...
Michael N. Huhns, Munindar P. Singh
IRREGULAR
1998
Springer
14 years 1 months ago
The Distributed Object-Oriented Threads System DOTS
Abstract. We describe the design and implementation of the Distributed ObjectOriented Threads System (DOTS). This system is a complete redesign of the Distributed Threads System (D...
Wolfgang Blochinger, Wolfgang Küchlin, Andrea...
ICDE
1993
IEEE
120views Database» more  ICDE 1993»
14 years 1 months ago
Adaptable Pointer Swizzling Strategies in Object Bases
In this article, different techniques for 'pointer swizzling" are classified and evaluated for optimizing the access to main-memory resident persistent objects. To speed ...
Alfons Kemper, Donald Kossmann
DBPL
1993
Springer
104views Database» more  DBPL 1993»
14 years 1 months ago
Extensible Grammars for Language Specialization
A frequent dilemma in the design of a database programming language is the choice between a language with a rich set of tailored notations for schema definitions, query expression...
Luca Cardelli, Florian Matthes, Martín Abad...