Sciweavers

352 search results - page 64 / 71
» Good Programming in Transactional Memory
Sort
View
CASES
2004
ACM
14 years 28 days ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
AAAI
2007
13 years 9 months ago
Automated Online Mechanism Design and Prophet Inequalities
Recent work on online auctions for digital goods has explored the role of optimal stopping theory — particularly secretary problems — in the design of approximately optimal on...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Tu...
BCS
2008
13 years 9 months ago
Overcoming Software Fragility with Interacting Feedback Loops and Reversible Phase Transitions
Programs are fragile for many reasons, including software errors, partial failures, and network problems. One way to make software more robust is to design it from the start as a ...
Peter Van Roy
ICCAD
2006
IEEE
180views Hardware» more  ICCAD 2006»
14 years 4 months ago
A bitmask-based code compression technique for embedded systems
Embedded systems are constrained by the available memory. Code compression techniques address this issue by reducing the code size of application programs. Dictionary-based code c...
Seok-Won Seong, Prabhat Mishra
VEE
2010
ACM
229views Virtualization» more  VEE 2010»
14 years 2 months ago
VMKit: a substrate for managed runtime environments
Managed Runtime Environments (MREs), such as the JVM and the CLI, form an attractive environment for program execution, by providing portability and safety, via the use of a bytec...
Nicolas Geoffray, Gaël Thomas, Julia L. Lawal...