Sciweavers

225 search results - page 31 / 45
» Design for Constraint Violation Detection in Safety-Critical...
Sort
View
POPL
2012
ACM
13 years 7 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
TCOM
2008
63views more  TCOM 2008»
14 years 11 months ago
A general construction of constrained parity-check codes for optical recording
This paper proposes a general and systematic code design method to efficiently combine constrained codes with parity-check (PC) codes for optical recording. The proposed constraine...
Kui Cai, Kees A. Schouhamer Immink
ANCS
2005
ACM
15 years 5 months ago
Resource mapping and scheduling for heterogeneous network processor systems
Task to resource mapping problems are encountered during (i) hardware-software co-design and (ii) performance optimization of Network Processor systems. The goal of the first pro...
Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinh...
AUTOMATICA
2004
138views more  AUTOMATICA 2004»
14 years 11 months ago
Decentralized overlapping control of a formation of unmanned aerial vehicles
Decentralized overlapping feedback laws are designed for a formation of unmanned aerial vehicles. The dynamic model of the formation with an information structure constraint in wh...
Dusan M. Stipanovic, Gökhan Inalhan, Rodney T...
MICRO
2008
IEEE
126views Hardware» more  MICRO 2008»
14 years 11 months ago
Multicore Resource Management
UAL PRIVATE MACHINE ABSTRACTION WOULD ALLOW SOFTWARE POLICIES TO EXPLICITLY MANAGE MICROARCHITECTURE RESOURCES. VPM POLICIES, IMPLEMENTED PRIMARILY IN SOFTWARE, TRANSLATE APPLICATI...
Kyle J. Nesbit, Miquel Moretó, Francisco J....