Sciweavers

2290 search results - page 356 / 458
» Extensible Protected Types
Sort
View
APSEC
1998
IEEE
15 years 6 months ago
Change Impact Analysis for A Class Hierarchy
Modified programs are required to be retested to determine whether changes have been made correctly and to investigate whether those cause any adverse effect on the program behavi...
Yoon Kyu Jang, Heung Seok Chae, Yong Rae Kwon, Doo...
PPDP
1999
Springer
15 years 6 months ago
A Virtual Machine for a Process Calculus
Abstract. Despite extensive theoretical work on process-calculi, virtual machine specifications and implementations of actual computational models are still scarce. This paper pre...
Luís M. B. Lopes, Fernando M. A. Silva, Vas...
ISCA
1998
IEEE
143views Hardware» more  ISCA 1998»
15 years 6 months ago
Lockup-Free Instruction Fetch/Prefetch Cache Organization
In the past decade. there has been much literature describing various cache organizatrons that exploit general programming idiosyncrasies to obtain maxrmum hit rate (the probabili...
David Kroft
ISCA
1998
IEEE
119views Hardware» more  ISCA 1998»
15 years 6 months ago
Using Prediction to Accelerate Coherence Protocols
Most large shared-memory multiprocessors use directory protocols to keep per-processor caches coherent. Some memory references in such systems, however, suffer long latencies for ...
Shubhendu S. Mukherjee, Mark D. Hill
ERCIMDL
1998
Springer
146views Education» more  ERCIMDL 1998»
15 years 6 months ago
METU-Emar: An Agent-Based Electronic Marketplace on the Web
Abstract. In this paper, we describe a scenario for a distributed marketplace on the Web where resource discovery agents find out about resources that may want to join the marketpl...
Asuman Dogac, Ilker Durusoy, Sena Nural Arpinar, E...