Sciweavers

6317 search results - page 1150 / 1264
» System Support for Pervasive Applications
Sort
View
PLDI
2003
ACM
15 years 9 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
112
Voted
WPES
2003
ACM
15 years 9 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
ADC
2003
Springer
106views Database» more  ADC 2003»
15 years 9 months ago
Database Component Ware
Database modeling is still a job of an artisan. Due to this approach database schemata evolve by growth without any evolution plan. Finally, they cannot be examined, surveyed, con...
Bernhard Thalheim
ERSHOV
2003
Springer
15 years 9 months ago
Data Mappings in the Model-View-Controller Pattern
The model-view-controller pattern is used to keep a data model and its views consistent. Usually there is a one-to-one correspondence between the data in the model and its represen...
Martin Rammerstorfer, Hanspeter Mössenbö...
COOPIS
2002
IEEE
15 years 8 months ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
« Prev « First page 1150 / 1264 Last » Next »