Sciweavers

203 search results - page 32 / 41
» How Program History Can Improve Code Completion
Sort
View
137
Voted
CODES
2004
IEEE
15 years 7 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
129
Voted
UML
2005
Springer
15 years 9 months ago
Tool Support for OCL and Related Formalisms - Needs and Trends
The recent trend in software engineering to model-centered methodologies is an excellent opportunity for OCL to become a widely used specification language. If the focus of the de...
Thomas Baar, Dan Chiorean, Alexandre L. Correa, Ma...
136
Voted
WSC
2001
15 years 5 months ago
Supply chain agent decision aid system (SCADAS)
Supply chain decisions are improved with access to global information. However, supply chain partners are frequently hesitant to provide full access to all the information within ...
Anurag Gupta, Larry Whitman, Ramesh K. Agarwal
137
Voted
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 10 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
116
Voted
CP
2003
Springer
15 years 9 months ago
Solving Max-SAT as Weighted CSP
For the last ten years, a significant amount of work in the constraint community has been devoted to the improvement of complete methods for solving soft constraints networks. We ...
Simon de Givry, Javier Larrosa, Pedro Meseguer, Th...