Sciweavers

6432 search results - page 1157 / 1287
» Classic Mechanism Design
Sort
View
99
Voted
SAC
2010
ACM
15 years 7 months ago
General constant expressions for system programming languages
Most mainstream system programming languages provide support for builtin types, and extension mechanisms through userdefined types. They also come with a notion of constant expre...
Gabriel Dos Reis, Bjarne Stroustrup
ACSC
2008
IEEE
15 years 7 months ago
On illegal composition of first-class agent interaction protocols
In this paper, we examine the composition of firstclass protocols for multi-agent systems. First-class protocols are protocols that exist as executable specifications that agent...
Tim Miller, Peter McBurney
CODES
2008
IEEE
15 years 7 months ago
Speculative DMA for architecturally visible storage in instruction set extensions
Instruction set extensions (ISEs) can accelerate embedded processor performance. Many algorithms for ISE generation have shown good potential; some of them have recently been expa...
Theo Kluter, Philip Brisk, Paolo Ienne, Edoardo Ch...
99
Voted
IEEEIAS
2008
IEEE
15 years 7 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
125
Voted
MICRO
2008
IEEE
131views Hardware» more  MICRO 2008»
15 years 7 months ago
Token flow control
As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scala...
Amit Kumar 0002, Li-Shiuan Peh, Niraj K. Jha
« Prev « First page 1157 / 1287 Last » Next »