Sciweavers

5810 search results - page 1070 / 1162
» An Approach to Programming Based on Concepts
Sort
View
CADE
2003
Springer
16 years 5 months ago
Foundational Certified Code in a Metalogical Framework
Foundational certified code systems seek to prove untrusted programs to be safe relative to safety policies given in terms of actual machine architectures, thereby improving the s...
Karl Crary, Susmit Sarkar
117
Voted
ICCD
2008
IEEE
124views Hardware» more  ICCD 2008»
16 years 1 months ago
Global bus route optimization with application to microarchitectural design exploration
— Circuit and processor designs will continue to increase in complexity for the foreseeable future. With these increasing sizes comes the use of wide buses to move large amounts ...
Dae Hyun Kim, Sung Kyu Lim
DSN
2009
IEEE
15 years 11 months ago
Fault isolation for device drivers
This work explores the principles and practice of isolating low-level device drivers in order to improve OS dependability. In particular, we explore the operations drivers can per...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...
INFOCOM
2009
IEEE
15 years 11 months ago
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints
Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access service and virtual private network (VPN) service providers. Various o...
Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wa...
ATAL
2009
Springer
15 years 11 months ago
Adversarial search with procedural knowledge heuristic
We introduce an adversarial planning algorithm based on game tree search, which is applicable in large-scale multiplayer domains. In order to tackle the scalability issues of game...
Viliam Lisý, Branislav Bosanský, Mic...
« Prev « First page 1070 / 1162 Last » Next »