Sciweavers

797 search results - page 90 / 160
» MODULA-2 and Its Compilation
Sort
View
ECRTS
2000
IEEE
15 years 9 months ago
Towards validated real-time software
We present a tool for the design and validation of embedded real-time applications. The tool integrates two approaches, the use of the synchronous programming language ESTEREL for...
Valérie Bertin, Michel Poize, Jacques Pulou...
IEEEPACT
2000
IEEE
15 years 9 months ago
Exploring Sub-Block Value Reuse for Superscalar Processors
The performance potential of a value reuse mechanism depends on its reuse detection time, the number of reuse opportunities, and the amount of work saved by skipping each reuse un...
Jian Huang, David J. Lilja
POPL
2000
ACM
15 years 8 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
JIT
1999
Springer
123views Database» more  JIT 1999»
15 years 8 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm
ECOOP
1998
Springer
15 years 8 months ago
Binary Component Adaptation
Binary component adaptation (BCA) allows components to be adapted and evolved in binary form and on-the-fly (during program loading). BCA rewrites component binaries before (or whi...
Ralph Keller, Urs Hölzle