Sciweavers

482 search results - page 84 / 97
» A bitmask-based code compression technique for embedded syst...
Sort
View
JSA
2000
175views more  JSA 2000»
15 years 6 days ago
Complete worst-case execution time analysis of straight-line hard real-time programs
In this article, the problem of finding a tight estimate on the worst-case execution time (WCET) of a real-time program is addressed. The analysis is focused on straight-line code...
Friedhelm Stappert, Peter Altenbernd
118
Voted
EMSOFT
2006
Springer
15 years 4 months ago
Reliability mechanisms for file systems using non-volatile memory as a metadata store
Portable systems such as cell phones and portable media players commonly use non-volatile RAM (NVRAM) to hold all of their data and metadata, and larger systems can store metadata...
Kevin M. Greenan, Ethan L. Miller
CODES
2004
IEEE
15 years 4 months ago
Optimizing the memory bandwidth with loop fusion
The memory bandwidth largely determines the performance and energy cost of embedded systems. At the compiler level, several techniques improve the memory bandwidth at the scope of...
Paul Marchal, José Ignacio Gómez, Fr...
100
Voted
ISTA
2003
15 years 1 months ago
Managing Business Logic with Symbolic Computation
: A new approach of building enterprise distributed applications for layer of business rules as standard part of architecture is proposed in this paper. The approach uses symbolic ...
Ruslan Shevchenko, Anatoly E. Doroshenko
106
Voted
ICSM
2009
IEEE
15 years 7 months ago
Modeling class cohesion as mixtures of latent topics
The paper proposes a new measure for the cohesion of classes in Object-Oriented software systems. It is based on the analysis of latent topics embedded in comments and identifiers...
Yixun Liu, Denys Poshyvanyk, Rudolf Ferenc, Tibor ...