Sciweavers

365 search results - page 26 / 73
» Types for Safe Locking
Sort
View
ACTA
2005
92views more  ACTA 2005»
13 years 8 months ago
Type-based information flow analysis for the pi-calculus
We propose a new type system for information flow analysis for the -calculus. As demonstrated by recent studies, information about whether each communication succeeds is important ...
Naoki Kobayashi
OTM
2009
Springer
14 years 3 months ago
TMBean: Optimistic Concurrency in Application Servers Using Transactional Memory
Abstract. In this experience report, we present an evaluation of different techniques to manage concurrency in the context of application servers. Traditionally, using entity beans...
Lucas Charles, Pascal Felber, Christophe Gêt...
DASFAA
2009
IEEE
203views Database» more  DASFAA 2009»
14 years 3 months ago
Adaptive Safe Regions for Continuous Spatial Queries over Moving Objects
Abstract. Continuous spatial queries retrieve a set of time-varying objects continuously during a given period of time. However, monitoring moving objects to maintain the correctne...
Yu-Ling Hsueh, Roger Zimmermann, Wei-Shinn Ku
GPCE
2007
Springer
14 years 3 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
GECCO
2006
Springer
181views Optimization» more  GECCO 2006»
14 years 15 days ago
Designing safe, profitable automated stock trading agents using evolutionary algorithms
Trading rules are widely used by practitioners as an effective means to mechanize aspects of their reasoning about stock price trends. However, due to the simplicity of these rule...
Harish Subramanian, Subramanian Ramamoorthy, Peter...