Sciweavers

797 search results - page 55 / 160
» MODULA-2 and Its Compilation
Sort
View
160
Voted
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
15 years 7 months ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
116
Voted
WSC
2007
15 years 6 months ago
ExtendSim 7
ExtendSim 7 is a proven simulation environment capable of modeling a wide range of systems. ExtendSim 7 is used to model continuous, discrete event, discrete rate, and agent based...
David Krahl
108
Voted
JVM
2001
97views Education» more  JVM 2001»
15 years 5 months ago
Deterministic Execution of Java's Primitive Bytecode Operations
For the application of Java in realtime and safety critical domains, an analysis of the worst-case execution times of primitive Java operations is necessary. All primitive operati...
Fridtjof Siebert, Andy Walter
115
Voted
ECEASST
2008
75views more  ECEASST 2008»
15 years 3 months ago
Extended OCL for Goal Monitoring
Monitoring human-computer interaction aids the analysis for understanding how well software meets its purpose. In particular, monitoring human-computer interactions with respect to...
William N. Robinson
LISP
2007
112views more  LISP 2007»
15 years 3 months ago
The next 700 Krivine machines
: The Krivine machine is a simple and natural implementation of the normal weak-head reduction strategy for pure λ-terms. While its original description has remained unpublished, ...
Rémi Douence, Pascal Fradet