Sciweavers

2624 search results - page 416 / 525
» The 2LIP model and its implementations
Sort
View
WWW
2007
ACM
14 years 9 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
ICFP
2007
ACM
14 years 9 months ago
Faster laziness using dynamic pointer tagging
In the light of evidence that Haskell programs compiled by GHC exhibit large numbers of mispredicted branches on modern processors, we re-examine the "tagless" aspect of...
Simon Marlow, Alexey Rodriguez Yakushev, Simon L. ...
ISPW
2009
IEEE
14 years 3 months ago
Distributed Orchestration Versus Choreography: The FOCAS Approach
Web service orchestration is popular because the application logic is defined from a central and unique point of view, but it suffers from scalability issues. In choreography, the ...
Gabriel Pedraza, Jacky Estublier
ATVA
2009
Springer
142views Hardware» more  ATVA 2009»
14 years 3 months ago
Synthesis of Fault-Tolerant Distributed Systems
Abstract. A distributed system is fault-tolerant if it continues to perform correctly even when a subset of the processes becomes faulty. Faulttolerance is highly desirable but oft...
Rayna Dimitrova, Bernd Finkbeiner
FMCAD
2009
Springer
14 years 3 months ago
Decision diagrams for linear arithmetic
—Boolean manipulation and existential quantification of numeric variables from linear arithmetic (LA) formulas is at the core of many program analysis and software model checkin...
Sagar Chaki, Arie Gurfinkel, Ofer Strichman