Sciweavers

755 search results - page 94 / 151
» Compiler generation from structural architecture description...
Sort
View
139
Voted
POPL
2010
ACM
16 years 1 months ago
From Program Verification to Program Synthesis
This paper describes a novel technique for the synthesis of imperative programs. Automated program synthesis has the potential to make programming and the design of systems easier...
Saurabh Srivastava, Sumit Gulwani, Jeffrey S. Fost...
TCAD
1998
95views more  TCAD 1998»
15 years 3 months ago
High-precision interconnect analysis
— Integrated circuits have evolved to a stage where interconnections significantly limit their performance and functional complexity. We introduce a set of tools to perform high...
Rui Martins, Wolfgang Pyka, Rainer Sabelka, Siegfr...
141
Voted
KDD
2001
ACM
262views Data Mining» more  KDD 2001»
16 years 4 months ago
LOGML: Log Markup Language for Web Usage Mining
Web Usage Mining refers to the discovery of interesting information from user navigational behavior as stored in web access logs. While extracting simple information from web logs...
John R. Punin, Mukkai S. Krishnamoorthy, Mohammed ...
184
Voted
WOSP
1998
ACM
15 years 7 months ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...
136
Voted
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 5 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...