Sciweavers

1631 search results - page 182 / 327
» Extreme Programming - Back to Basics
Sort
View
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
14 years 3 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
ATAL
2003
Springer
14 years 3 months ago
Process Algebra for Agent Communication: A General Semantic Approach
Abstract. In this paper, we consider the process algebra ACPL, which models the basics of agent communication. This algebra combines the informationprocessing aspects of Concurrent...
Rogier M. van Eijk, Frank S. de Boer, Wiebe van de...
CCS
2003
ACM
14 years 3 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
ICS
2003
Tsinghua U.
14 years 3 months ago
Performance characteristics of openMP constructs, and application benchmarks on a large symmetric multiprocessor
With the increasing popularity of small to large-scale symmetric multiprocessor (SMP) systems, there has been a dire need to have sophisticated, and flexible development and runt...
Nathan R. Fredrickson, Ahmad Afsahi, Ying Qian
MODELS
2009
Springer
14 years 2 months ago
An Example Is Worth a Thousand Words: Composite Operation Modeling By-Example
Abstract. Predefined composite operations are handy for efficient modeling, e.g., for the automatic execution of refactorings, and for the introduction of patterns in existing mod...
Petra Brosch, Philip Langer, Martina Seidl, Konrad...