Sciweavers

2200 search results - page 303 / 440
» Programming norm change
Sort
View
MICRO
2002
IEEE
164views Hardware» more  MICRO 2002»
14 years 3 months ago
A quantitative framework for automated pre-execution thread selection
Pre-execution attacks cache misses for which conventional address-prediction driven prefetching is ineffective. In pre-execution, copies of cache miss computations are isolated fr...
Amir Roth, Gurindar S. Sohi
LCTRTS
2010
Springer
14 years 3 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
GECCO
2009
Springer
258views Optimization» more  GECCO 2009»
14 years 3 months ago
Evolutionary learning of local descriptor operators for object recognition
Nowadays, object recognition is widely studied under the paradigm of matching local features. This work describes a genetic programming methodology that synthesizes mathematical e...
Cynthia B. Pérez, Gustavo Olague
REFLECTION
2001
Springer
14 years 3 months ago
Separation of Concerns in Mobile Agent Applications
Abstract. Using mobile agent systems, cooperative distributed applications that run over the Internet can be constructed flexibly. However, there are some problems: it is difficul...
Naoyasu Ubayashi, Tetsuo Tamai
BIRTHDAY
2007
Springer
14 years 2 months ago
Deriving Specifications for Systems That Are Connected to the Physical World
Well understood methods exist for developing programs from formal specifications. Not only do such methods offer a precise check that certain sorts of deviations from their specifi...
Cliff B. Jones, Ian J. Hayes, Michael A. Jackson