Sciweavers

6554 search results - page 1183 / 1311
» Constraint Logic Programming
Sort
View
135
Voted
BROADNETS
2007
IEEE
15 years 10 months ago
Dedicated path protection for waveband switching in WDM networks (invited paper)
— This paper considers the problem of dedicated path-protection in a wavelength-division multiplexing (WDM) mesh network with waveband switching (WBS) functionality under shared ...
Mengke Li, Byrav Ramamurthy
116
Voted
IPSN
2007
Springer
15 years 9 months ago
Interface contracts for TinyOS
TinyOS applications are built with software components that communicate through narrow interfaces. Since components enable finegrained code reuse, this approach has been successf...
Will Archer, Philip Levis, John Regehr
146
Voted
LCTRTS
2004
Springer
15 years 9 months ago
A trace-based binary compilation framework for energy-aware computing
Energy-aware compilers are becoming increasingly important for embedded systems due to the need to meet conflicting constraints on time, code size and power consumption. We intro...
Lian Li 0002, Jingling Xue
119
Voted
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
15 years 8 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli
126
Voted
PLDI
2010
ACM
15 years 8 months ago
Z-rays: divide arrays and conquer speed and flexibility
Arrays are the ubiquitous organization for indexed data. Throughout programming language evolution, implementations have laid out arrays contiguously in memory. This layout is pro...
Jennifer B. Sartor, Stephen M. Blackburn, Daniel F...
« Prev « First page 1183 / 1311 Last » Next »