Sciweavers

1821 search results - page 300 / 365
» Security-Aware Program Transformations
Sort
View
MP
2008
60views more  MP 2008»
13 years 8 months ago
Extreme optics and the search for Earth-like planets
In this paper I describe a new and exciting application of optimization technology. The problem is to design a space telescope capable of imaging Earth-like planets around nearby s...
Robert J. Vanderbei
SPE
2008
89views more  SPE 2008»
13 years 8 months ago
The Runabout
This paper presents a variation of the visitor pattern which allows programmers to write visitor-like code in a concise way. The Runabout is a library extension that adds a limited...
Christian Grothoff
ISCI
1998
91views more  ISCI 1998»
13 years 8 months ago
The Improper Fuzzy Riemann Integral and its Numerical Integration
The improper fuzzy Riemann integral and its numerical integration are proposed in this paper. Under the setting of the improper fuzzy Riemann integral, we can ®nd the expectation...
Hsien-Chung Wu
TCAD
2002
107views more  TCAD 2002»
13 years 8 months ago
Value-sensitive automatic code specialization for embedded software
The objective of this work is to create a framework for the optimization of embedded software. We present algorithms and a tool flow to reduce the computational effort of programs,...
Eui-Young Chung, Luca Benini, Giovanni De Micheli,...
OOPSLA
2010
Springer
13 years 7 months ago
The two-state solution: native and serializable continuations accord
Continuation-based Web servers provide advantages over traditional Web application development through the increase of expressive power they allow. This leads to fewer errors and ...
Jay A. McCarthy