Sciweavers

2038 search results - page 104 / 408
» Loops under Strategies
Sort
View
ADAEUROPE
2004
Springer
15 years 9 months ago
On the Tree Width of Ada Programs
The tree width of a graph G measures how close G is to being a tree or a series-parallel graph. Many well-known problems that are otherwise NP-complete can be solved efficiently if...
Bernd Burgstaller, Johann Blieberger, Bernhard Sch...
EMSOFT
2004
Springer
15 years 9 months ago
An approach for integrating basic retiming and software pipelining
Basic retiming is an algorithm originally developed for hardware optimization. Software pipelining is a technique proposed to increase instruction-level parallelism for parallel p...
Noureddine Chabini, Wayne Wolf
ASWEC
2000
IEEE
15 years 8 months ago
ReVis: Reverse Engineering by Clustering and Visual Object Classification
This paper presents the framework of a scale-oriented scheme for the presentation and classification of reverse engineered sections of procedural code into objects. The aim is to ...
Aaron J. Quigley, Margot Postema, Heinz W. Schmidt
INFOCOM
1996
IEEE
15 years 8 months ago
Congestion-Oriented Shortest Multipath Routing
We present a framework for the modeling of multipath routing in connectionless networks that dynamically adapt to network congestion. The basic routing protocol uses a short-term ...
Shree Murthy, J. J. Garcia-Luna-Aceves
ACTAC
2008
94views more  ACTAC 2008»
15 years 4 months ago
Effect Preservation in Transaction Processing in Rule Triggering Systems
Rules provide an expressive means for implementing database behavior: They cope with changes and their ramifications. Rules are commonly used for integrity enforcement, i.e., for ...
Mira Balaban, Steffen Jurk