Sciweavers

122 search results - page 17 / 25
» A Graph Rewriting Approach for Transformational Design of Di...
Sort
View
HT
2005
ACM
14 years 1 months ago
Searching a file system using inferred semantic links
We describe Eureka, a file system search engine that takes into account the inherent relationships among files in order to improve the rankings of search results. The key idea b...
Deepavali Bhagwat, Neoklis Polyzotis
TCAD
1998
114views more  TCAD 1998»
13 years 7 months ago
Behavioral optimization using the manipulation of timing constraints
— We introduce a transformation, named rephasing, that manipulates the timing parameters in control-data-flow graphs (CDFG’s) during the high-level synthesis of data-pathinten...
Miodrag Potkonjak, Mani B. Srivastava
FPGA
2008
ACM
174views FPGA» more  FPGA 2008»
13 years 9 months ago
Pattern-based behavior synthesis for FPGA resource reduction
Pattern-based synthesis has drawn wide interest from researchers who tried to utilize the regularity in applications for design optimizations. In this paper we present a general p...
Jason Cong, Wei Jiang
CCS
2003
ACM
14 years 24 days ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
AGTIVE
2007
Springer
13 years 11 months ago
Generating Domain-Specific Model Editors with Complex Editing Commands
Abstract. Domain specific modeling languages are of increasing importance for the development of software and other systems. Meta tools are needed to support rapid development of d...
Gabriele Taentzer, André Crema, René...