Sciweavers

661 search results - page 85 / 133
» What Can We Expect from Program Verification
Sort
View
SASP
2009
IEEE
156views Hardware» more  SASP 2009»
14 years 3 months ago
Introducing control-flow inclusion to support pipelining in custom instruction set extensions
—Multi-cycle Instruction set extensions (ISE) can be pipelined in order to increase their throughput; however, typical program traces seldom contain consecutive calls to the same...
Marcela Zuluaga, Theo Kluter, Philip Brisk, Nigel ...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 3 months ago
Optimum Internet Gateway Selection in Ad Hoc Networks
—Wireless ad hoc networks are connected to the fixed Internet by means of Internet gateways. Whenever a node within the ad hoc network wishes to communicate with a host in the I...
Felix Hoffmann, Daniel Medina
IFIP
1993
Springer
14 years 26 days ago
Computer Science in Elementary and Secondary Schools
In this paper we examine the current computer science curriculum in elementary schools and identify its shortcomings. We then presents a new approach to teaching computer science ...
Viera K. Proulx
EMSOFT
2001
Springer
14 years 1 months ago
Interface Theories for Component-Based Design
Abstract. We classify component-based models of computation into component models and interface models. A component model speci es for each component how the component behaves in a...
Luca de Alfaro, Thomas A. Henzinger
PET
2010
Springer
14 years 22 days ago
How Unique Is Your Web Browser?
We investigate the degree to which modern web browsers are subject to “device fingerprinting” via the version and configuration information that they will transmit to website...
Peter Eckersley