Sciweavers

60 search results - page 7 / 12
» REST in Practice
Sort
View
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
13 years 12 months ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
ECRTS
1999
IEEE
13 years 11 months ago
Cluster simulation-support for distributed development of hard real-time systems using TDMA-based communication
In the eld of safety-critical real-time systems the development of distributed applications for fault tolerance reasons is a common practice. Hereby the whole application is divid...
Thomas M. Galla, Roman Pallierer
ESEC
1999
Springer
13 years 11 months ago
Data-Flow Analysis of Program Fragments
Traditional interprocedural data-flow analysis is performed on whole programs; however, such whole-program analysis is not feasible for large or incomplete programs. We propose fr...
Atanas Rountev, Barbara G. Ryder, William Landi
ACSAC
2006
IEEE
13 years 11 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
DSN
2006
IEEE
13 years 11 months ago
Lucky Read/Write Access to Robust Atomic Storage
This paper establishes tight bounds on the best-case time-complexity of distributed atomic read/write storage implementations that tolerate worst-case conditions. We study asynchr...
Rachid Guerraoui, Ron R. Levy, Marko Vukolic