Sciweavers

1499 search results - page 267 / 300
» A Software Architectural Approach to Security by Design
Sort
View
MOBICOM
1999
ACM
15 years 4 months ago
Next Century Challenges: RadioActive Networks
A key challenge facing wireless networking is to utilize the spectrum as e ciently as possible given current channel conditions and in the most e ective way for each application. ...
Vanu G. Bose, David Wetherall, John V. Guttag
HIPEAC
2009
Springer
15 years 3 months ago
HeDGE: Hybrid Dataflow Graph Execution in the Issue Logic
Abstract. Exposing more instruction-level parallelism in out-of-order superscalar processors requires increasing the number of dynamic in-flight instructions. However, large instru...
Suriya Subramanian, Kathryn S. McKinley
IIWAS
2008
15 years 1 months ago
Using conditional transformations for semantic user interface adaptation
The rapid growth of mobile Internet use requires highly flexible and adaptable user interfaces for web applications. Contextual data from various sources as for example device HMI...
Pascal Bihler, Merlin Fotsing, Günter Kniesel...
CASES
2006
ACM
15 years 5 months ago
Adapting compilation techniques to enhance the packing of instructions into registers
The architectural design of embedded systems is becoming increasingly idiosyncratic to meet varying constraints regarding energy consumption, code size, and execution time. Tradit...
Stephen Hines, David B. Whalley, Gary S. Tyson
CASES
2009
ACM
15 years 6 months ago
Tight WCRT analysis of synchronous C programs
Accurate estimation of the tick length of a synchronous program is essential for efficient and predictable implementations that are devoid of timing faults. The techniques to dete...
Partha S. Roop, Sidharta Andalam, Reinhard von Han...