Sciweavers

3801 search results - page 715 / 761
» An Approach to Modeling Software Safety
Sort
View
OOPSLA
2001
Springer
15 years 2 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
57
Voted
MSS
2000
IEEE
100views Hardware» more  MSS 2000»
15 years 2 months ago
Project 1244: IEEE Storage System Standards
Approaching its tenth anniversary, the IEEE Storage System Standards effort is in the process of balloting Media Management System (MMS) standards. These represent the first stand...
John L. Cole
ASPLOS
2000
ACM
15 years 2 months ago
Power Aware Page Allocation
One of the major challenges of post-PC computing is the need to reduce energy consumption, thereby extending the lifetime of the batteries that power these mobile devices. Memory ...
Alvin R. Lebeck, Xiaobo Fan, Heng Zeng, Carla Schl...
ICCAD
1998
IEEE
120views Hardware» more  ICCAD 1998»
15 years 1 months ago
Communication synthesis for distributed embedded systems
Designers of distributed embedded systems face many challenges in determining the appropriate tradeoffs to make when defining a system architecture or retargeting an existing desi...
Ross B. Ortega, Gaetano Borriello
ICECCS
1998
IEEE
110views Hardware» more  ICECCS 1998»
15 years 1 months ago
Risk Assessment and Integrity in System Design
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system imp...
Raymond Berg, Victor L. Winter