Sciweavers

1477 search results - page 211 / 296
» Token flow control
Sort
View
DAC
2004
ACM
14 years 11 months ago
Characterizing embedded applications for instruction-set extensible processors
Extensible processors, which allow customization for an application domain by extending the core instruction set architecture, are becoming increasingly popular for embedded syste...
Pan Yu, Tulika Mitra
DAC
2006
ACM
14 years 11 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...
SIGSOFT
2008
ACM
14 years 10 months ago
Specification of an exception handling system for a replicated agent environment
Exception handling and replication are two mechanisms that increase software reliability. Exception handling helps programmers control situations in which the normal flow of a pro...
Christophe Dony, Chouki Tibermacine, Christelle Ur...
SIGSOFT
2003
ACM
14 years 10 months ago
Context-sensitive slicing of concurrent programs
Program slicing is a technique to identify statements that may influence the computations at other statements. Precise slicing has been shown to be undecidable for concurrent prog...
Jens Krinke
CHI
2008
ACM
14 years 10 months ago
Video browsing by direct manipulation
We present a method for browsing videos by directly dragging their content. This method brings the benefits of direct manipulation to an activity typically mediated by widgets. We...
Pierre Dragicevic, Gonzalo Ramos, Jacobo Bibliowit...