Sciweavers

8623 search results - page 1661 / 1725
» Software engineering for secure systems
Sort
View
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
14 years 1 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
HICSS
1994
IEEE
152views Biometrics» more  HICSS 1994»
14 years 1 months ago
Simple COMA Node Implementations
Shared memory architectures often have caches to reduce the number of slow remote memory accesses. The largest possible caches exist in shared memory architectures called Cache-On...
Erik Hagersten, Ashley Saulsbury, Anders Landin
ERLANG
2007
ACM
14 years 29 days ago
A language for specifying type contracts in Erlang and its interaction with success typings
We propose a small extension of the ERLANG language that allows programmers to specify contracts with type information at the level of individual functions. Such contracts are opt...
Miguel Jimenez, Tobias Lindahl, Konstantinos F. Sa...
HIPC
2007
Springer
14 years 28 days ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
HT
2007
ACM
14 years 28 days ago
User-tailored web accessibility evaluations
This paper presents a framework and system to evaluate the accessibility of web pages according to the individual requirements of users with disabilities. These requirements not o...
Markel Vigo, Alfred Kobsa, Myriam Arrue, Julio Aba...
« Prev « First page 1661 / 1725 Last » Next »