Sciweavers

797 search results - page 55 / 160
» MODULA-2 and Its Compilation
Sort
View
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
14 years 7 days ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
WSC
2007
13 years 10 months ago
ExtendSim 7
ExtendSim 7 is a proven simulation environment capable of modeling a wide range of systems. ExtendSim 7 is used to model continuous, discrete event, discrete rate, and agent based...
David Krahl
JVM
2001
97views Education» more  JVM 2001»
13 years 10 months ago
Deterministic Execution of Java's Primitive Bytecode Operations
For the application of Java in realtime and safety critical domains, an analysis of the worst-case execution times of primitive Java operations is necessary. All primitive operati...
Fridtjof Siebert, Andy Walter
ECEASST
2008
75views more  ECEASST 2008»
13 years 8 months ago
Extended OCL for Goal Monitoring
Monitoring human-computer interaction aids the analysis for understanding how well software meets its purpose. In particular, monitoring human-computer interactions with respect to...
William N. Robinson
LISP
2007
112views more  LISP 2007»
13 years 8 months ago
The next 700 Krivine machines
: The Krivine machine is a simple and natural implementation of the normal weak-head reduction strategy for pure λ-terms. While its original description has remained unpublished, ...
Rémi Douence, Pascal Fradet