Sciweavers

1631 search results - page 73 / 327
» Extreme Programming - Back to Basics
Sort
View
92
Voted
ICALP
1990
Springer
15 years 6 months ago
Term Rewriting Systems: From Church-Rosser to Knuth-Bendix and Beyond
Termrewritingsystemsare importantfor computabilitytheoryof abstractdata types,for automatictheorem proving, and for the foundationsof functionalprogramming.In this shortsurveywe pr...
Jan Willem Klop
ICALP
2009
Springer
15 years 6 months ago
Efficient Methods for Selfish Network Design
Intuitively, Braess's paradox states that destroying a part of a network may improve the common latency of selfish flows at Nash equilibrium. Such a paradox is a pervasive phe...
Dimitris Fotakis, Alexis C. Kaporis, Paul G. Spira...
105
Voted
POS
2000
Springer
15 years 6 months ago
Transparent Orthogonal Checkpointing through User-Level Pagers
Orthogonal persistence opens up the possibility for a number of applications. We present an approach for easily enabling transparent orthogonal persistence, basically on top of a m...
Espen Skoglund, Christian Ceelen, Jochen Liedtke
86
Voted
MSCS
2008
86views more  MSCS 2008»
15 years 2 months ago
Maurer computers for pipelined instruction processing
We model micro-architectures with non-pipelined instruction processing and pipelined instruction processing, using Maurer machines, basic thread algebra and program algebra. We sho...
Jan A. Bergstra, C. A. Middelburg
105
Voted
ICFP
2004
ACM
16 years 2 months ago
Making a fast curry: push/enter vs. eval/apply for higher-order languages
Higher-order languages that encourage currying are implemented using one of two basic evaluation models: push/enter or eval/apply. Implementors use their intuition and qualitative...
Simon Marlow, Simon L. Peyton Jones