Sciweavers

7430 search results - page 1452 / 1486
» Programming Applications in CIFF
Sort
View
OOPSLA
2009
Springer
14 years 1 months ago
Good examples for exposing bad practice: a "killer examples" workshop
The “Killer Examples” series of workshops are highly interactive workshops which have been an annual occurrence at OOPSLA since 2002. The goals of the workshop are to bring to...
Dale Skrien, Michael E. Caspersen, Jürgen B&o...
CHARME
2001
Springer
133views Hardware» more  CHARME 2001»
14 years 1 months ago
View from the Fringe of the Fringe
Formal analysis remains outside the mainstream of system design practice. Interactive methods and tools are regarded by some to be on the margin of useful research in this area. Al...
Steven D. Johnson
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
EMSOFT
2001
Springer
14 years 1 months ago
Adaptive and Reflective Middleware for Distributed Real-Time and Embedded Systems
Software has become strategic to developing effective distributed real-time and embedded (DRE) systems. Next-generation DRE systems, such as total ship computing environments, coo...
Douglas C. Schmidt
ICS
2001
Tsinghua U.
14 years 1 months ago
Slice-processors: an implementation of operation-based prediction
We describe the Slice Processor micro-architecture that implements a generalized operation-based prefetching mechanism. Operation-based prefetchers predict the series of operation...
Andreas Moshovos, Dionisios N. Pnevmatikatos, Amir...
« Prev « First page 1452 / 1486 Last » Next »