Sciweavers

754 search results - page 131 / 151
» Architectural Design Recovery using Data Mining Techniques
Sort
View
DAC
2009
ACM
14 years 7 months ago
WCET-aware register allocation based on graph coloring
Current compilers lack precise timing models guiding their built-in optimizations. Hence, compilers apply ad-hoc heuristics during optimization to improve code quality. One of the...
Heiko Falk
DAC
2007
ACM
14 years 7 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
EMSOFT
2009
Springer
14 years 1 months ago
Handling mixed-criticality in SoC-based real-time embedded systems
System-on-Chip (SoC) is a promising paradigm to implement safety-critical embedded systems, but it poses significant challenges from a design and verification point of view. In ...
Rodolfo Pellizzoni, Patrick O'Neil Meredith, Min-Y...
SIGCOMM
2010
ACM
13 years 7 months ago
Fine-grained channel access in wireless LAN
Modern communication technologies are steadily advancing the physical layer (PHY) data rate in wireless LANs, from hundreds of Mbps in current 802.11n to over Gbps in the near fut...
Kun Tan, Ji Fang, Yuanyang Zhang, Shouyuan Chen, L...
PVLDB
2010
166views more  PVLDB 2010»
13 years 5 months ago
Towards Elastic Transactional Cloud Storage with Range Query Support
Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is i...
Hoang Tam Vo, Chun Chen, Beng Chin Ooi