Sciweavers

8503 search results - page 1459 / 1701
» Secure Software Architectures
Sort
View
LCTRTS
2009
Springer
14 years 5 months ago
A compiler optimization to reduce soft errors in register files
Register file (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes to protect the RF are prohibitive not only because RF is often in the timing c...
Jongeun Lee, Aviral Shrivastava
LCTRTS
2009
Springer
14 years 5 months ago
Synergistic execution of stream programs on multicores with accelerators
The StreamIt programming model has been proposed to exploit parallelism in streaming applications on general purpose multicore architectures. The StreamIt graphs describe task, da...
Abhishek Udupa, R. Govindarajan, Matthew J. Thazhu...
ICIW
2008
IEEE
14 years 4 months ago
Evaluating the Use of AOP and MDA in Web Service Development
— Model-Driven Architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other...
Guadalupe Ortiz, Behzad Bordbar, Juan Herná...
KBSE
2007
IEEE
14 years 4 months ago
Assertion-based repair of complex data structures
Programmers have long used assertions to characterize properties of code. An assertion violation signals a corruption in the program state. At such a state, it is standard to term...
Bassem Elkarablieh, Ivan Garcia, Yuk Lai Suen, Sar...
EMSOFT
2007
Springer
14 years 4 months ago
WCET estimation for executables in the presence of data caches
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation...
Rathijit Sen, Y. N. Srikant
« Prev « First page 1459 / 1701 Last » Next »