• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 37
Next 10 →

Fbufs: A High-Bandwidth Cross-Domain Transfer Facility

by Peter Druschel, Larry L. Peterson - in Proceedings of the Fourteenth ACM symposium on Operating Systems Principles , 1993
"... We have designed and implemented a new operating system facility for I/O buffer management and data transfer across protection domain boundaries on shared memory machines. This facility, called fast buffers (fbufs), combines virtual page remapping with shared virtual memory, and exploits locality in ..."
Abstract - Cited by 332 (15 self) - Add to MetaCart
of attention recently [2, 3]. This is because an efficient cross-domain invocation facility enables a ...

Implementing the real-time publisher/subscriber model on the controller area network (CAN

by J. Kaiser, M. Mock - In Proceedings of the 2nd International Symposium on Object-oriented Real-time distributed Computing (ISORC99 , 1999
"... Designing distributed real-time systems as being composed of communicating objects offers many advantages with respect to modularity and extensibility of these systems. However, distributed real-time applications exhibit communication patterns that significantly differ from the traditional object in ..."
Abstract - Cited by 37 (9 self) - Add to MetaCart
invocation style. The publisher/subscriber model for inter-object communication matches well with these patterns. Any implementation of that model must address the problems of binding subscribers to publishers, of routing and filtering of messages, as well as reliability, efficiency and latency of message

ADEPTworkflow - advanced workflow technology for the efficient support of adaptive, enterprise-wide processes

by Clemens Hensinger, Manfred Reichert, Thomas Bauer, Thomas Strzeletz, Peter Dadam - In Conference on Extending Database Technology , 2000
"... WfMS for (potentially) enterprise-wide application scenarios. It concentrates on the realization of flexible, robust WF-based applications, which have to run stable and which are used by non-computerexperts. To achieve the desired robustness, an appropriate formal WF model has been developed which a ..."
Abstract - Cited by 9 (4 self) - Add to MetaCart
allows to validate the correctness of a WF template already at build-time (e.g., exclusion of deadlocks, proper invocation of activity components, etc.). For achieving flexibility, appropriate concepts have been developed to support ad-hoc changes of in-progress WF (e.g., to add new steps, to omit steps

Fine-Grained Access Conftol in a Transactional Obi e ct- Oriented

by Luis-felipe Cabrera Allen
"... ABSTRACT tüe believe that access controls for objectoriented systems should be fine-grained and thus apply to individual methods of individual objects. The efficient support of fine-grained access control is challenging because a check is done on every method invocation. rüe present a design that us ..."
Abstract - Add to MetaCart
ABSTRACT tüe believe that access controls for objectoriented systems should be fine-grained and thus apply to individual methods of individual objects. The efficient support of fine-grained access control is challenging because a check is done on every method invocation. rüe present a design

Providing Easier Access to Remote Objects in Client-Server Systems

by Jonathan Aldrich , James Dooley, Scott Mandelsohn, Adam Rifkin - PROC. OF THE THIRTY-FIRST HAWAII INT. CONFERENCE ON SYSTEM SCIENCES. HAWAII. IEEE , 1998
"... The Java Environment for Distributed Invocation (JEDI) is efficient, dynamic, and easier to use than alternative communication systems for distributed Java objects. Existing state-of-the-art mechanisms for remote method calls on Java objects, such as RMI, require users to perform a complicated serie ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
The Java Environment for Distributed Invocation (JEDI) is efficient, dynamic, and easier to use than alternative communication systems for distributed Java objects. Existing state-of-the-art mechanisms for remote method calls on Java objects, such as RMI, require users to perform a complicated

An Overview of COOL and COOL-IDL

by C. Jacquemot, F. Herrmann, P. S. Jensen, P. Gautron, J. Mukerji, H. G. Baumgarten, H. Hartlage - Multi-threaded Processes in Chorus/MIX. In Proc. of EUUG Spring'90 Conference , 1994
"... COOL is a CORBA compliant object-oriented framework for programming services on the CHORUS microkernel. It provides a set of basic facilities (e.g. remote invocation, persistence, migration, : : : ) to support the creation and execution of services ranging from operating system components to high ..."
Abstract - Add to MetaCart
COOL is a CORBA compliant object-oriented framework for programming services on the CHORUS microkernel. It provides a set of basic facilities (e.g. remote invocation, persistence, migration, : : : ) to support the creation and execution of services ranging from operating system components to high

A Model for Parallel Programming

by Lawrence Crowl - in Proceedings of the 1988 Open , 1988
"... Current parallel programming languages support only a narrow range of programming styles; force programmers to bind the specification of parallelism too early in program development; and limit the class of architectures for which they are effective. This paper presents a model for parallel programmi ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
and to bind parallelism late in program development. In addition, the model may be efficiently implemented on a wide range of multiprocessor architectures. 1 Introduction Current imperative languages for parallel programming tend to provide separate facilities for parallel programming on top of a base

Gled – an Implementation of a Hierarchic Server–Client Model

by Matevz ̌ Tadel , 2003
"... Gled is an implementation of a hierarchic server–client model written in C++, having an outside form of an object oriented framework. Master server exposes its object space to its first-level clients which in turn provide mirroring facilities to second-level clients and also export their own object ..."
Abstract - Add to MetaCart
spaces. Each client therefore plays a role of a client, a proxy and a server. Infrastructure for propagation and broadcasting of method invocation requests is provided and is general enough to allow for an efficient access control. Synchronization of object spaces is achieved via streaming of object

USENIX Association Proceedings of the

by unknown authors , 2000
"... Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. The Java ..."
Abstract - Add to MetaCart
hardware protection domains to separate Java classes, provide access control on cross domain method invocations, efficient data sharing between protection domains, and memory and CPU resource control. These security measures, when they do not violate the policy, are all transparent to the Java programs

Persistent Programming Languages: The Best of Both Worlds

by Rex Jakobovits
"... The integration of databases and programming langauges is being motivated from two directions. The database community requires a more flexible and powerful way of modeling the world, whereas the programming language community wants the convenience of a reliable, efficient means of enabling entities ..."
Abstract - Add to MetaCart
to persist between program invocations. Traditionally, the query facilities provided to database users are not computationally complete, precluding arbitrarily complex processing of data. Furthermore, they support only primitive data types, making them inappropriate for modeling certain real world
Next 10 →
Results 1 - 10 of 37
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University