Sciweavers

7504 search results - page 1452 / 1501
» Computing with Action Potentials
Sort
View
POPL
1998
ACM
14 years 2 months ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...
SEAL
1998
Springer
14 years 2 months ago
Automating Space Allocation in Higher Education
The allocation of office space in any large institution is usually a problematical issue, which often demands a substantial amount of time to perform manually. The result of this a...
Edmund K. Burke, D. B. Varley
PLDI
1997
ACM
14 years 2 months ago
Componential Set-Based Analysis
Set-based analysis is a constraint-based whole program analysis that is applicable to functional and objectoriented programming languages. Unfortunately, the analysis is useless f...
Cormac Flanagan, Matthias Felleisen
SIGCOMM
1997
ACM
14 years 2 months ago
Consistent Overhead Byte Stuffing
—Byte stuffing is a process that encodes a sequence of data bytes that may contain ‘illegal’ or ‘reserved’ values, using a potentially longer sequence that contains no oc...
Stuart Cheshire, Mary Baker
MOBICOM
1996
ACM
14 years 2 months ago
Low-Loss TCP/IP Header Compression for Wireless Networks
Wireless is becoming a popular way to connect mobile computers to the Internet and other networks. The bandwidth of wireless links will probably always be limited due to propertie...
Mikael Degermark, Mathias Engan, Björn Nordgr...
« Prev « First page 1452 / 1501 Last » Next »