Sciweavers

1597 search results - page 228 / 320
» A Design Method for Object-Oriented Programming
Sort
View
122
Voted
ASM
2010
ASM
16 years 18 days ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
ICCD
2006
IEEE
171views Hardware» more  ICCD 2006»
16 years 13 days ago
Stochastic Dynamic Thermal Management: A Markovian Decision-based Approach
This paper proposes a stochastic dynamic thermal management (DTM) technique in high-performance VLSI system with especial attention to the uncertainty in temperature observation. ...
Hwisung Jung, Massoud Pedram
90
Voted
DAC
2009
ACM
15 years 10 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
ISCA
2008
IEEE
134views Hardware» more  ISCA 2008»
15 years 10 months ago
Achieving Out-of-Order Performance with Almost In-Order Complexity
There is still much performance to be gained by out-of-order processors with wider issue widths. However, traditional methods of increasing issue width do not scale; that is, they...
Francis Tseng, Yale N. Patt
128
Voted
ACRI
2008
Springer
15 years 10 months ago
GP Generation of Pedestrian Behavioral Rules in an Evacuation Model Based on SCA
This paper presents a research in the context of pedestrian dynamics according to Situated Cellular Agent (SCA), a Multi-Agent Systems approach whose roots are on Cellular Automata...
Stefania Bandini, Sara Manzoni, Giancarlo Mauri, S...