Sciweavers

33356 search results - page 6588 / 6672
» Models of Continual Computation
Sort
View
PLDI
2010
ACM
15 years 8 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...
WOLLIC
2010
Springer
15 years 8 months ago
Modal Logics with Counting
Abstract. We present a modal language that includes explicit operators to count the number of elements that a model might include in the extension of a formula, and we discuss how ...
Carlos Areces, Guillaume Hoffmann, Alexandre Denis
APSEC
2002
IEEE
15 years 8 months ago
iBistro: A Learning Environment for Knowledge Construction in Distributed Software Engineering Courses
We have taught several distributed software engineering project courses with students and real clients [4]. During these projects, students in Pittsburgh and Munich, Germany colla...
Andreas Braun, Allen H. Dutoit, Andreas Harrer, Be...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 8 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
139
Voted
ICPP
2002
IEEE
15 years 8 months ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...
« Prev « First page 6588 / 6672 Last » Next »