Sciweavers

365 search results - page 48 / 73
» Types for Safe Locking
Sort
View
RTSS
2008
IEEE
14 years 3 months ago
Predictable Interrupt Management and Scheduling in the Composite Component-Based System
This paper presents the design of user-level scheduling hierarchies in the Composite component-based system. The motivation for this is centered around the design of a system that...
Gabriel Parmer, Richard West
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
RTCSA
1998
IEEE
14 years 1 months ago
Wait-Free Snapshots in Real-Time Systems: Algorithms and Performance
Snap-shot mechanisms are used to read a globally consistent set of variable values. Such a mechanism can be used to solve a variety of communication and synchronization problems, ...
Andreas Ermedahl, Hans Hansson, Marina Papatrianta...
DC
2010
13 years 9 months ago
Model checking transactional memories
Model checking software transactional memories (STMs) is difficult because of the unbounded number, length, and delay of concurrent transactions and the unbounded size of the memo...
Rachid Guerraoui, Thomas A. Henzinger, Vasu Singh
SIGMOD
2005
ACM
187views Database» more  SIGMOD 2005»
14 years 9 months ago
A Generic Framework for Monitoring Continuous Spatial Queries over Moving Objects
This paper proposes a generic framework for monitoring continuous spatial queries over moving objects. The framework distinguishes itself from existing work by being the first to ...
Haibo Hu, Jianliang Xu, Dik Lun Lee