Sciweavers

3040 search results - page 176 / 608
» Independent Natural Extension
Sort
View
ECOOP
1999
Springer
14 years 3 months ago
Type-Safe Delegation for Run-Time Component Adaptation
Abstract. The aim of component technology is the replacement of large monolithic applications with sets of smaller software components, whose particular functionality and interoper...
Günter Kniesel
ICPP
1998
IEEE
14 years 3 months ago
Concurrent SSA Form in the Presence of Mutual Exclusion
Most current compiler analysis techniques are unable to cope with the semantics introduced by explicit parallel and synchronization constructs in parallel programs. In this paper ...
Diego Novillo, Ronald C. Unrau, Jonathan Schaeffer
ISSS
1998
IEEE
73views Hardware» more  ISSS 1998»
14 years 3 months ago
Resource Constrained Modulo Scheduling with Global Resource Sharing
Commonly used scheduling algorithms in high-level synthesis are not capable of sharing resources across process boundaries. This results in the usage of at least one resource per ...
Christoph Jäschke, Rainer Laur
FC
1998
Springer
134views Cryptology» more  FC 1998»
14 years 3 months ago
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension o...
Anna Lysyanskaya, Zulfikar Ramzan
SMA
1997
ACM
152views Solid Modeling» more  SMA 1997»
14 years 2 months ago
Structured Topological Complexes: A Feature-Based API for Non-Manifold Topologies
Much of recent research in representation schemes for solid modeling was focused on the extension of boundary representations to support non-manifold topologies. We introduce here...
Jarek Rossignac