Sciweavers

1821 search results - page 237 / 365
» Security-Aware Program Transformations
Sort
View
ICCAD
2007
IEEE
106views Hardware» more  ICCAD 2007»
14 years 6 months ago
A general model for performance optimization of sequential systems
Abstract— Retiming, c-slow retiming and recycling are different transformations for the performance optimization of sequential circuits. For retiming and c-slow retiming, differe...
Dmitry Bufistov, Jordi Cortadella, Michael Kishine...
ISORC
2009
IEEE
14 years 4 months ago
Fault-Tolerance for Component-Based Systems - An Automated Middleware Specialization Approach
General-purpose middleware, by definition, cannot readily support domain-specific semantics without significant manual efforts in specializing the middleware. This paper prese...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
IPPS
2008
IEEE
14 years 4 months ago
Towards effective automatic parallelization for multicore systems
The ubiquity of multicore processors in commodity computing systems has raised a significant programming challenge for their effective use. An attractive but challenging approach...
Uday Bondhugula, Muthu Manikandan Baskaran, Albert...
MSR
2006
ACM
14 years 3 months ago
Are refactorings less error-prone than other changes?
Refactorings are program transformations which should preserve the program behavior. Consequently, we expect that during phases when there are mostly refactorings in the change hi...
Peter Weißgerber, Stephan Diehl
ADAEUROPE
2005
Springer
14 years 3 months ago
Extending Ravenscar with CSP Channels
Abstract. The Ravenscar Profile is a restricted subset of the Ada tasking model, designed to meet the requirements of producing analysable and deterministic code. A central featur...
Diyaa-Addein Atiya, Steve King