Sciweavers

303 search results - page 41 / 61
» No task left behind
Sort
View
DAC
1996
ACM
13 years 11 months ago
Address Calculation for Retargetable Compilation and Exploration of Instruction-Set Architectures
The advent of parallel executing Address Calculation Units (ACUs) in Digital Signal Processor (DSP) and Application Specific InstructionSet Processor (ASIP) architectures has made...
Clifford Liem, Pierre G. Paulin, Ahmed Amine Jerra...
EUROMICRO
2009
IEEE
13 years 11 months ago
Using JavaBeans to Realize a Domain-Specific Component Model
SaveCCM is a domain specific component model developed specifically for safety-critical hard real-time embedded systems in the vehicular domain. This paper expands the scope of Sa...
Juraj Feljan, Jan Carlson, Mario Zagar
DIMVA
2010
13 years 9 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
LREC
2010
258views Education» more  LREC 2010»
13 years 9 months ago
PolNet - Polish WordNet: Data and Tools
This paper presents the PolNet-Polish WordNet project which aims at building a linguistically oriented ontology for Polish compatible with other WordNet projects such as Princeton...
Zygmunt Vetulani, Marek Kubis, Tomasz Obrêbs...
NSDI
2010
13 years 9 months ago
Crom: Faster Web Browsing Using Speculative Execution
Early web content was expressed statically, making it amenable to straightforward prefetching to reduce userperceived network delay. In contrast, today's rich web application...
James Mickens, Jeremy Elson, Jon Howell, Jay Lorch