Sciweavers

1045 search results - page 193 / 209
» The Use of Exceptions
Sort
View
ECRTS
2007
IEEE
14 years 2 months ago
A Delay Composition Theorem for Real-Time Pipelines
Uniprocessor schedulability theory made great strides, in part, due to the simplicity of composing the delay of a job from the execution times of higher-priority jobs that preempt...
Praveen Jayachandran, Tarek F. Abdelzaher
IMA
2007
Springer
137views Cryptology» more  IMA 2007»
14 years 2 months ago
Algebraic Cryptanalysis of the Data Encryption Standard
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the practical point of view. The triple DES is believed ...
Nicolas Courtois, Gregory V. Bard
ISCA
2006
IEEE
125views Hardware» more  ISCA 2006»
14 years 2 months ago
Architectural Semantics for Practical Transactional Memory
Transactional Memory (TM) simplifies parallel programming by allowing for parallel execution of atomic tasks. Thus far, TM systems have focused on implementing transactional stat...
Austen McDonald, JaeWoong Chung, Brian D. Carlstro...
ISCAS
2006
IEEE
136views Hardware» more  ISCAS 2006»
14 years 2 months ago
An adaptable foveating vision chip
In this work we present an adaptable foveating vision biological eye has exceptionally good optomechanics. This chip. This chip has no physical foveation; all its pixels are in the...
Timothy G. Constandinou, Patrick Degenaar, Christo...
ACMSE
2006
ACM
14 years 1 months ago
Extensions to and optimization of a mobile computational system for internet programming
elow are abstracts of student-faculty collaborative work presented at regional, national, and international conferences. Gregory Adkins, Elizabeth Carter, Amanda Micai, and Sarah M...
Sarah Monisha Pulimood, Gregory Adkins, Elizabeth ...