Sciweavers

11909 search results - page 2363 / 2382
» The Scheme Programming Language
Sort
View
ICDCS
1990
IEEE
14 years 21 days ago
A Constructive Approach to the Design of Distributed Systems
The underlying model of distributed systems is that of loosely coupled components r running in parallel and communicating by message passing. Description, construction and evoluti...
Jeff Kramer, Jeff Magee, Anthony Finkelstein
MFPS
1989
14 years 21 days ago
Operations on Records
We define a simple collection of operations for creating and manipulating record structures, where records are intended as finite associations of values to labels. A second-order ...
Luca Cardelli, John C. Mitchell
CCGRID
2009
IEEE
14 years 20 days ago
Experiment and Workflow Management Using Cyberaide Shell
In recent years the power of Grid computing has grown exponentially through the development of advanced middleware systems. While usage has increased, the penetration of Grid compu...
Gregor von Laszewski, Andrew J. Younge, Xi He, Kum...
CCS
2007
ACM
14 years 20 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CODES
2007
IEEE
14 years 18 days ago
Influence of procedure cloning on WCET prediction
For the worst-case execution time (WCET) analysis, especially loops are an inherent source of unpredictability and loss of precision. This is caused by the difficulty to obtain sa...
Paul Lokuciejewski, Heiko Falk, Martin Schwarzer, ...
« Prev « First page 2363 / 2382 Last » Next »