Sciweavers

759 search results - page 77 / 152
» What Can Be Implemented Anonymously
Sort
View
PPOPP
1997
ACM
14 years 2 months ago
The Interaction of Parallel Programming Constructs and Coherence Protocols
Some of the most common parallel programming idioms include locks, barriers, and reduction operations. The interaction of these programming idioms with the multiprocessor's c...
Ricardo Bianchini, Enrique V. Carrera, Leonidas I....
LCPC
1999
Springer
14 years 2 months ago
An Empirical Study of Function Pointers Using SPEC Benchmarks
Since the C language imposes little restriction on the use of function pointers, the task of call graph construction for a C program is far more di cult than what the algorithms d...
Ben-Chung Cheng, Wen-mei W. Hwu
SIGCOMM
1994
ACM
14 years 2 months ago
Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines
This paper discusses congestion control from a game-theoretic perspective. There are two basic premises: (1) users are assumed to be independent and sel sh, and (2) central admini...
Scott Shenker
CHI
2005
ACM
14 years 10 months ago
Mixed interaction space: designing for camera based interaction with mobile devices
In mobile devices, such as mobile phones and PDAs, an integrated camera can be used to interact with the device in new ways. In this paper we introduce the term mixed interaction ...
Thomas Riisgaard Hansen, Eva Eriksson, Andreas Lyk...
WWW
2010
ACM
14 years 5 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner