Sciweavers

86 search results - page 10 / 18
» cc 2008
Sort
View
USS
2008
13 years 12 months ago
An Empirical Security Study of the Native Code in the JDK
It is well known that the use of native methods in Java defeats Java's guarantees of safety and security, which is why the default policy of Java applets, for example, does n...
Gang Tan, Jason Croft
CC
2010
Springer
117views System Software» more  CC 2010»
14 years 4 months ago
Punctual Coalescing
Compilers use register coalescing to avoid generating code for copy instructions. For architectures with register aliasing such as x86, Smith, Ramsey, and Holloway (2004) presented...
Fernando Magno Quintão Pereira, Jens Palsbe...
VTC
2008
IEEE
106views Communications» more  VTC 2008»
14 years 4 months ago
Simulation-Based Performance Evaluation of Enhanced Broadcast Schemes for IEEE 802.11-Based Vehicular Networks
—Car-to-car communication (C2CC) enables cars to exchange information that can be used to, e.g., improve the drivers’ safety or comfort. Recently, WLANs based on the IEEE 802.1...
Yvonne Mertens, Matthias Wellens, Petri Mäh&o...
ESA
2011
Springer
251views Algorithms» more  ESA 2011»
12 years 9 months ago
Improved Approximation Algorithms for Bipartite Correlation Clustering
In this work we study the problem of Bipartite Correlation Clustering (BCC), a natural bipartite counterpart of the well studied Correlation Clustering (CC) problem. Given a bipart...
Nir Ailon, Noa Avigdor-Elgrabli, Edo Liberty, Anke...
TKDE
1998
139views more  TKDE 1998»
13 years 9 months ago
Distributed Optimistic Concurrency Control Methods for High-Performance Transaction Processing
—There is an ever-increasing demand for more complex transactions and higher throughputs in transaction processing systems leading to higher degrees of transaction concurrency an...
Alexander Thomasian