Sciweavers

4330 search results - page 765 / 866
» Analyzing security architectures
Sort
View
135
Voted
LCTRTS
1998
Springer
15 years 7 months ago
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques
Abstract. Previously published methods for estimation of the worstcase execution time on contemporary processors with complex pipelines and multi-level memory hierarchies result in...
Thomas Lundqvist, Per Stenström
139
Voted
ICPP
1997
IEEE
15 years 7 months ago
Automatic Parallelization and Scheduling of Programs on Multiprocessors using CASCH
r The lack of a versatile software tool for parallel program development has been one of the major obstacles for exploiting the potential of high-performance architectures. In this...
Ishfaq Ahmad, Yu-Kwong Kwok, Min-You Wu, Wei Shu
138
Voted
INFOCOM
1997
IEEE
15 years 7 months ago
Design and Performance Analysis of a Growable Multicast ATM Switch
In ihis paper, we design and analyze a growable multicast ATM switch. It can grow to a large size since both cell routing and contention resolution are designed to distribute over...
Kuochen Wang, Ming-Howe Cheng
115
Voted
BTLAB
1997
Springer
15 years 7 months ago
A Real-Life Experiment in Creating an Agent Marketplace
Software agents help people with time consuming activities. One increasingly popular application for software agents is electronic commerce, namely having agents buy and sell good...
Anthony Chavez, Daniel Dreilinger, Robert H. Guttm...
139
Voted
ASPLOS
1996
ACM
15 years 7 months ago
The Structure and Performance of Interpreters
Interpreted languages have become increasingly popular due to demands for rapid program development, ease of use, portability, and safety. Beyond the general impression that they ...
Theodore H. Romer, Dennis Lee, Geoffrey M. Voelker...