This paper describes a kernel interface that provides an untrusted user-level process (an executive) with protected access to memory management functions, including the ability to create, manipulate, and execute within subservient contexts (address spaces). Page motion callbacks not only give the executive limited control over physical memory management, but also shift certain responsibilities out of the kernel, greatly reducing kernel state and complexity. The executive interface was motivated by the requirements of the Wisconsin Wind Tunnel (WWT), a system for evaluating cache-coherent shared-memory parallel architectures. WWT uses the executive interface to implement a fine-grain user-level extension of Li's shared virtual memory on a Th...
In many cryptographic protocols, the actions performed by principals are iterative processes. Howeve...
An extended version of this paper was published in the Journal of Theoretical Computer Science (TCS)...
International audienceIn this paper, the classical visual servoing techniques have been extended to ...
This paper discusses the uses of context in knowledge representation and reasoning (KRR). We propose...
Even, Goldreich and Micali showed at Crypto'89 that the existence of signature schemes secure agains...
In this paper, a synthesis and learning method for the neural network with embedded gate units and a...
Rapport interne.From intuitionistic proof nets of linear logic, we abstract an order between axiom l...
Spectral filtering methods are investigated for use in reducing the Gibbs oscillations that result w...
It follows from the known relationships among the dierent classes of graphical Markov models for c...
We consider an M/G/1 queue with the special feature of additional negative customers, who arrive acc...
We attempt to assess the effect of monetary policy in a panel model for 16 OECD countries. To answer...
It is appealing to implement publish/subscribe systems in a peer to peer (P2P) manner to circumvent ...
International audience‘In a previous work, we have defined a temporal model based on regular languag...
Special Issue on Combinatorics and Computer ScienceInternational audienceThis paper uses a realistic...
CC++ is a parallel object-oriented programming language that uses parallel composition, atomic funct...
In many cryptographic protocols, the actions performed by principals are iterative processes. Howeve...
An extended version of this paper was published in the Journal of Theoretical Computer Science (TCS)...
International audienceIn this paper, the classical visual servoing techniques have been extended to ...
This paper discusses the uses of context in knowledge representation and reasoning (KRR). We propose...
Even, Goldreich and Micali showed at Crypto'89 that the existence of signature schemes secure agains...
In this paper, a synthesis and learning method for the neural network with embedded gate units and a...
Rapport interne.From intuitionistic proof nets of linear logic, we abstract an order between axiom l...
Spectral filtering methods are investigated for use in reducing the Gibbs oscillations that result w...
It follows from the known relationships among the dierent classes of graphical Markov models for c...
We consider an M/G/1 queue with the special feature of additional negative customers, who arrive acc...
We attempt to assess the effect of monetary policy in a panel model for 16 OECD countries. To answer...
It is appealing to implement publish/subscribe systems in a peer to peer (P2P) manner to circumvent ...
International audience‘In a previous work, we have defined a temporal model based on regular languag...
Special Issue on Combinatorics and Computer ScienceInternational audienceThis paper uses a realistic...
CC++ is a parallel object-oriented programming language that uses parallel composition, atomic funct...
In many cryptographic protocols, the actions performed by principals are iterative processes. Howeve...
An extended version of this paper was published in the Journal of Theoretical Computer Science (TCS)...
International audienceIn this paper, the classical visual servoing techniques have been extended to ...