Sciweavers

514 search results - page 82 / 103
» Dependency Analysis of Ada Programs
Sort
View
ACMSE
2005
ACM
15 years 8 months ago
Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system
In this paper, we describe recent work in developing a peer-topeer collaborative environment. The study examines various locking mechanisms/policies by adjusting the granularity o...
Jon A. Preston, Sushil K. Prasad
108
Voted
COCO
2005
Springer
128views Algorithms» more  COCO 2005»
15 years 8 months ago
More on Noncommutative Polynomial Identity Testing
We continue the study of noncommutative polynomial identity testing initiated by Raz and Shpilka and present efficient algorithms for the following problems in the noncommutative...
Andrej Bogdanov, Hoeteck Wee
118
Voted
CC
2004
Springer
15 years 8 months ago
Using Multiple Memory Access Instructions for Reducing Code Size
An important issue in embedded systems design is the size of programs. As computing devices decrease in size, yet with more and more functions, better code size optimizations are i...
Neil Johnson, Alan Mycroft
118
Voted
ECOOP
2001
Springer
15 years 7 months ago
On the Usefulness of Liveness for Garbage Collection and Leak Detection
Abstract. The effectiveness of garbage collectors and leak detectors in identifying dead objects depends on the “accuracy” of their reachability traversal. Accuracy has two ort...
Martin Hirzel, Amer Diwan, Antony L. Hosking
127
Voted
IEEEPACT
1999
IEEE
15 years 7 months ago
Cameron: High level Language Compilation for Reconfigurable Systems
This paper presents the Cameron Project 1 , which aims to provide a high level, algorithmic language and optimizing compiler for the development of image processing applications o...
Jeffrey Hammes, Robert Rinker, A. P. Wim Böhm...