Optimizing Embedded Virtual Machines | 0 | 0.34 | 2009 |
Noise Injection for Search Privacy Protection | 19 | 1.38 | 2009 |
Balancing computation and communication costs: The case for hybrid execution in sensor networks | 11 | 0.74 | 2008 |
Anycast-Rpc For Wireless Sensor Networks | 0 | 0.34 | 2007 |
A software framework for integrated sensor network applications | 1 | 0.39 | 2006 |
BOTS: a constraint-based component system for synthesizing scalable software systems | 6 | 0.51 | 2006 |
A framework for software evolution in sensor networks | 0 | 0.34 | 2006 |
Y-Threads: supporting concurrency in wireless sensor networks | 11 | 0.71 | 2006 |
Bialancingv Computation and Communication Costs: The Case for Hybrid Execution in Sensor Networks | 1 | 0.37 | 2006 |
VMSTAR: synthesizing scalable runtime environments for sensor networks | 72 | 4.25 | 2005 |
Remote incremental linking for energy-efficient reprogramming of sensor networks | 64 | 2.80 | 2005 |
Using code collection to support large applications on mobile devices | 2 | 0.40 | 2004 |
Dynamically Evolvable Distributed Systems | 0 | 0.34 | 2002 |
A Scheduling Scheme for Controlling Allocation of CPU Resources for Mobile Programs | 2 | 0.88 | 2002 |
A Fast Connection-Time Redirection Mechanism for Internet Application Scalability | 1 | 0.40 | 2002 |
A Flexible Containment Mechanism for Executing Untrusted Code | 34 | 5.40 | 2002 |
Support for implementation of evolutionary concurrent systems | 1 | 0.35 | 2001 |
Using JIT Compilation and Configurable Runtime Systems for Efficient Deployment of Java Programs on Ubiquitous Devices | 8 | 1.13 | 2001 |
MAGE: A Distributed Programming Model | 6 | 0.63 | 2001 |
Supporting reconfigurable security policies for mobile programs | 18 | 1.57 | 2000 |
Specifying and implementing security policies using lasco, the language for security constraints on objects | 0 | 0.34 | 2000 |
Providing Fine-Grained Access Control For Java Programs Via Binary Editing | 8 | 0.68 | 2000 |
Runtime Support for Type-Safe Dynamic Java Classes | 102 | 5.21 | 2000 |
Fair resource allocation in active networks | 9 | 0.61 | 2000 |
Supporting Flexible Safety and Sharing in Multi-threaded Environments | 0 | 0.34 | 2000 |
Providing Fine-grained Access Control for Java Programs | 20 | 1.54 | 1999 |
Providing dynamic and customizable caching policies | 5 | 0.95 | 1999 |
CPU Resource Control for Mobile Programs | 4 | 1.46 | 1999 |
Security Policy Specification Using a Graphical Approach | 40 | 2.88 | 1998 |
Securing Systems Against External Programs | 7 | 0.61 | 1998 |
Supporting quality of service in HTTP servers | 39 | 4.19 | 1998 |
Support for Extensibility and Reusability in a Concurrent Object-Oriented Programming Language | 1 | 0.35 | 1996 |
A compositional approach to concurrent programming | 6 | 2.56 | 1996 |
Support for Implementation of Evolutionary Concurrent Systems in Concurrent Programming Languages | 1 | 0.35 | 1996 |
A compositional approach to concurrent object-oriented programming | 7 | 0.63 | 1994 |
Event-based Composition of Concurrent Programs | 5 | 0.52 | 1993 |