Sciweavers

PPDP
2000
Springer
13 years 11 months ago
Enhanced sharing analysis techniques: a comprehensive evaluation
an abstract domain developed by D. Jacobs and A. Langen for the analysis of logic programs, derives useful aliasing information. It is well-known that a commonly used core of tech...
Roberto Bagnara, Enea Zaffanella, Patricia M. Hill
POS
2000
Springer
13 years 11 months ago
Hyper-Code Revisited: Unifying Program Source, Executable, and Data
Abstract. The technique of hyper-programming allows program representations held in a persistent store to contain embedded links to persistent code and data. In 1994, Connor et al ...
Evangelos Zirintsis, Graham N. C. Kirby, Ronald Mo...
POS
2000
Springer
13 years 11 months ago
TMOS: A Transactional Garbage Collector
Abstract. Defining persistence in terms of reachability is fundamental to achieving orthogonality of persistence. It is implicit to the principles of orthogonal persistence and is ...
John N. Zigman, Stephen Blackburn, J. Eliot B. Mos...
POS
2000
Springer
13 years 11 months ago
The Memory Behavior of the WWW, or The WWW Considered as a Persistent Store
Abstract. This paper presents the performance evaluation of five memory allocation strategies for the PerDiS Persistent Distributed Object store in the context of allocating two di...
Nicolas Richer, Marc Shapiro
POS
2000
Springer
13 years 11 months ago
A Framework for Persistence-Enabled Optimization of Java Object Stores
Abstract. Aggressive optimization of programs often relies on analysis and transformation that cuts across the natural abstraction boundaries of the source programming language, su...
David Whitlock, Antony L. Hosking
POS
2000
Springer
13 years 11 months ago
Transparent Orthogonal Checkpointing through User-Level Pagers
Orthogonal persistence opens up the possibility for a number of applications. We present an approach for easily enabling transparent orthogonal persistence, basically on top of a m...
Espen Skoglund, Christian Ceelen, Jochen Liedtke
POS
2000
Springer
13 years 11 months ago
Implementing Orthogonally Persistent Java
Orthogonally persistent Java combines the power of abstraction over persistence with Java's rich programming environment. In this paper we report our experience in designing a...
Alonso Marquez, Stephen Blackburn, Gavin Mercer, J...
POPL
2000
ACM
13 years 11 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
POPL
2000
ACM
13 years 11 months ago
Generalized Certificate Revocation
We introduce a language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates. Our ap...
Carl A. Gunter, Trevor Jim