Sciweavers

466 search results - page 35 / 94
» Critical Reasoning
Sort
View
ISPASS
2003
IEEE
14 years 2 months ago
Evaluating the importance of virtual memory for Java
The Java language has rapidly become widespread and it is being used to implement a broad range of applications, including applications with high resource requirements. For this r...
Yolanda Becerra, Toni Cortes, Jordi Garcia, Nacho ...
VL
2002
IEEE
109views Visual Languages» more  VL 2002»
14 years 1 months ago
Assertions in End-User Software Engineering: A Think-Aloud Study
There has been little research on end-user program development beyond the programming phase. Devising ways to address additional phases may be critical, because research shows tha...
Christine Wallace, Curtis R. Cook, Jay Summet, Mar...
ISPD
1999
ACM
97views Hardware» more  ISPD 1999»
14 years 1 months ago
A methodology to analyze power, voltage drop and their effects on clock skew/delay in early stages of design
This paper presents a methodology to analyze signal integrity such as power voltage drop and clock skew in early stages of design, more specifically, when RTL-design and early flo...
Masato Iwabuchi, Noboru Sakamoto, Yasushi Sekine, ...
ISSS
1999
IEEE
157views Hardware» more  ISSS 1999»
14 years 1 months ago
Bit-Width Selection for Data-Path Implementations
Specifications of data computations may not necessarily describe the ranges of the intermediate results that can be generated. However, such information is critical to determine t...
Carlos Carreras, Juan A. López, Octavio Nie...
WETICE
1999
IEEE
14 years 29 days ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...