Sciweavers

303 search results - page 40 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
DAC
1995
ACM
14 years 16 days ago
A Transformation-Based Approach for Storage Optimization
High-level synthesis (HLS) has been successfully targeted towards the digital signal processing (DSP) domain. Both application-speci c integrated circuits (ASICs) and application-...
Wei-Kai Cheng, Youn-Long Lin
IANDC
2008
128views more  IANDC 2008»
13 years 9 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
HICSS
2006
IEEE
120views Biometrics» more  HICSS 2006»
14 years 3 months ago
Reconciling the Irreconcilable? A Software Development Approach that Combines Agile with Formal
Unstable software requirements are common and call for Agile practices. On the other hand, quality standards and recommendations, to which companies must adhere to play in selecte...
José Gonçalo A. Oliveira Basto da Si...
RTSS
2006
IEEE
14 years 3 months ago
LITMUS^RT : A Testbed for Empirically Comparing Real-Time Multiprocessor Schedulers
We present a real-time, Linux-based testbed called LITMUSRT , which we have developed for empirically evaluating multiprocessor real-time scheduling algorithms. We also present th...
John M. Calandrino, Hennadiy Leontyev, Aaron Block...
COMPSAC
1997
IEEE
14 years 1 months ago
DRDB: a distributed real-time database server for high-assurance time-critical applications
Many real-time database systems are now being used in safety-critical applications, in which human lives or expensive machinery may be at stake. Transactions in real-time database...
Sang Hyuk Son, Robert C. Beckinger, David A. Baker