Sciweavers

741 search results - page 69 / 149
» Problem Programmers
Sort
View
ASPDAC
2004
ACM
103views Hardware» more  ASPDAC 2004»
13 years 11 months ago
Design and implementation of a secret key steganographic micro-architecture employing FPGA
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...
Hala A. Farouk, Magdy Saeb
ECOOP
2006
Springer
13 years 11 months ago
Efficient Object Querying for Java
Modern programming languages have little or no support for querying objects and collections. Programmers are forced to hand code such queries using nested loops, which is both cumb...
Darren Willis, David J. Pearce, James Noble
ICDE
2000
IEEE
82views Database» more  ICDE 2000»
13 years 11 months ago
Generalized Isolation Level Definitions
Commercial databases support different isolation levels to allow programmers to trade off consistency for a potential gain in performance. The isolation levels are defined in the ...
Atul Adya, Barbara Liskov, Patrick E. O'Neil
ICSE
2000
IEEE-ACM
13 years 11 months ago
Automated refactoring to introduce design patterns
Software systems have to be flexible in order to cope with evolving requirements. However, since it is impossible to predict with certainty what future requirements will emerge, i...
Mel Ó Cinnéide
ISSS
1995
IEEE
96views Hardware» more  ISSS 1995»
13 years 11 months ago
Time-constrained code compaction for DSPs
{DSP algorithms in most cases are subject to hard real-time constraints. In case of programmable DSP processors, meeting those constraints must be ensured by appropriate code gener...
Rainer Leupers, Peter Marwedel