Concurrent computing

Results: 9919



#Item
831Themis: Enforcing Titanium Consistency on the NOW Carleton Miyamoto and Ben Liblit CS262 Semester Project Report Computer Science Division University of California at Berkeley {miyamoto,liblit}@CS.Berkeley.EDU

Themis: Enforcing Titanium Consistency on the NOW Carleton Miyamoto and Ben Liblit CS262 Semester Project Report Computer Science Division University of California at Berkeley {miyamoto,liblit}@CS.Berkeley.EDU

Add to Reading List

Source URL: titanium.cs.berkeley.edu

Language: English - Date: 2014-04-29 06:11:57
832LNCSTransactional Monitors for Concurrent Objects

LNCSTransactional Monitors for Concurrent Objects

Add to Reading List

Source URL: www.adamwelc.org

Language: English - Date: 2007-07-31 20:51:28
833Profiling Field Initialisation in Java Stephen Nelson, David J. Pearce, and James Noble Victoria University of Wellington Wellington, New Zealand {stephen,djp,kjx}@ecs.vuw.ac.nz

Profiling Field Initialisation in Java Stephen Nelson, David J. Pearce, and James Noble Victoria University of Wellington Wellington, New Zealand {stephen,djp,kjx}@ecs.vuw.ac.nz

Add to Reading List

Source URL: homepages.ecs.vuw.ac.nz

Language: English - Date: 2012-09-29 03:33:01
834Automatic Testing of Sequential and Concurrent Substitutability Michael Pradel Thomas R. Gross

Automatic Testing of Sequential and Concurrent Substitutability Michael Pradel Thomas R. Gross

Add to Reading List

Source URL: mp.binaervarianz.de

Language: English - Date: 2013-03-07 02:30:00
835A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems Pablo Buiras1 , Amit Levy2 , Deian Stefan2 , Alejandro Russo1 , and David Mazi`eres2 1

A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems Pablo Buiras1 , Amit Levy2 , Deian Stefan2 , Alejandro Russo1 , and David Mazi`eres2 1

Add to Reading List

Source URL: amitlevy.com

Language: English - Date: 2013-09-13 15:42:52
836Safe Futures for Java Adam Welc  Suresh Jagannathan

Safe Futures for Java Adam Welc Suresh Jagannathan

Add to Reading List

Source URL: www.adamwelc.org

Language: English - Date: 2007-08-01 17:06:34
837Automatic Generation of Object Usage Specifications from Large Method Traces

Automatic Generation of Object Usage Specifications from Large Method Traces

Add to Reading List

Source URL: mp.binaervarianz.de

Language: English - Date: 2009-09-02 13:08:00
838Hashing it out in public Common failure modes of DHT-based anonymity schemes Andrew Tran Nicholas Hopper

Hashing it out in public Common failure modes of DHT-based anonymity schemes Andrew Tran Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-02 23:56:34
839open issues in Dataflow HEATHER MILLER

open issues in Dataflow HEATHER MILLER

Add to Reading List

Source URL: heather.miller.am

Language: English - Date: 2014-01-23 17:58:15
840Botnets and Beyond Crimeware in the 21st Century Bill Hayes - CISSP Omaha World-Herald Company

Botnets and Beyond Crimeware in the 21st Century Bill Hayes - CISSP Omaha World-Herald Company

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2008-05-16 20:02:08