Sciweavers

15885 search results - page 2969 / 3177
» The Modest Software Engineer
Sort
View
EUROSYS
2010
ACM
14 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
MSR
2010
ACM
14 years 2 months ago
Should I contribute to this discussion?
Abstract—Development mailing lists play a central role in facilitating communication in open source projects. Since these lists frequently host design and project discussions, kn...
Walid Ibrahim, Nicolas Bettenburg, Emad Shihab, Br...
MSR
2010
ACM
14 years 2 months ago
The Ultimate Debian Database: Consolidating bazaar metadata for Quality Assurance and data mining
—FLOSS distributions like RedHat and Ubuntu require a lot more complex infrastructures than most other FLOSS projects. In the case of community-driven distributions like Debian, ...
Lucas Nussbaum, Stefano Zacchiroli
PLDI
2010
ACM
14 years 2 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
CODES
2002
IEEE
14 years 2 months ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
« Prev « First page 2969 / 3177 Last » Next »