Sciweavers

3792 search results - page 97 / 759
» Techniques for Trusted Software Engineering
Sort
View
PEPM
2007
ACM
15 years 9 months ago
Lowering: a static optimization technique for transparent functional reactivity
Functional Reactive Programming (frp) extends traditional functional programming with dataflow evaluation, making it possible to write interactive programs in a declarative style...
Kimberley Burchett, Gregory H. Cooper, Shriram Kri...
102
Voted
WER
2007
Springer
15 years 9 months ago
Exploiting a Goal-Decomposition Technique to Prioritize Non-functional Requirements
Business stakeholders need to have clear and realistic goals if they want to meet commitments in application development. As a consequence, at early stages they prioritize require...
Maya Daneva, Mohamad Kassab, María Laura Po...
121
Voted
SWSTE
2005
IEEE
15 years 9 months ago
Mapping Structures for Flash Memories: Techniques and Open Problems
Flash memory is a type of electrically erasable programmable read-only memory (EEPROM). Because flash memories are nonvolatile and relatively dense, they are now used to store ï¬...
Eran Gal, Sivan Toledo
103
Voted
CGO
2003
IEEE
15 years 8 months ago
Predicate-Aware Scheduling: A Technique for Reducing Resource Constraints
Predicated execution enables the removal of branches wherein segments of branching code are converted into straight-line segments of conditional operations. An important, but gene...
Mikhail Smelyanskiy, Scott A. Mahlke, Edward S. Da...
108
Voted
CODES
1999
IEEE
15 years 8 months ago
A hardware-software cosynthesis technique based on heterogeneous multiprocessor scheduling
In this paper, we propose a fast and simple heuristic for the cosynthesis problem targeting the system-on-chip (SOC) design. The proposed algorithm covers from implementation sele...
Hyunok Oh, Soonhoi Ha