Sciweavers

5241 search results - page 976 / 1049
» Embedded Programming with C
Sort
View
ESOP
2004
Springer
14 years 2 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
LCTRTS
2004
Springer
14 years 2 months ago
Feedback driven instruction-set extension
Application specific instruction-set processors combine an efficient general purpose core with special purpose functionality that is tailored to a particular application domain. ...
Uwe Kastens, Dinh Khoi Le, Adrian Slowik, Michael ...
SAB
2004
Springer
182views Optimization» more  SAB 2004»
14 years 2 months ago
The SWARM-BOTS Project
This paper provides an overview of the SWARM-BOTS project, a robotic project sponsored by the Future and Emerging Technologies program of the European Commission. The paper illustr...
Marco Dorigo, Elio Tuci, Roderich Groß, Vito...
VMCAI
2004
Springer
14 years 2 months ago
Boolean Algebra of Shape Analysis Constraints
Shape analysis is a promising technique for statically verifying and extracting properties of programs that manipulate complex data structures. We introduce a new characterization...
Viktor Kuncak, Martin C. Rinard
ASPLOS
2010
ACM
14 years 2 months ago
Probabilistic job symbiosis modeling for SMT processor scheduling
Symbiotic job scheduling boosts simultaneous multithreading (SMT) processor performance by co-scheduling jobs that have ‘compatible’ demands on the processor’s shared resour...
Stijn Eyerman, Lieven Eeckhout