Sciweavers

5241 search results - page 378 / 1049
» Embedded Programming with C
Sort
View
123
Voted
CCS
2009
ACM
15 years 10 months ago
Finding bugs in exceptional situations of JNI programs
Software flaws in native methods may defeat Java’s guarantees of safety and security. One common kind of flaws in native methods results from the discrepancy on how exceptions...
Siliang Li, Gang Tan
128
Voted
SENSYS
2004
ACM
15 years 9 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
122
Voted
STOC
2009
ACM
136views Algorithms» more  STOC 2009»
16 years 4 months ago
Random walks on polytopes and an affine interior point method for linear programming
Let K be a polytope in Rn defined by m linear inequalities. We give a new Markov Chain algorithm to draw a nearly uniform sample from K. The underlying Markov Chain is the first t...
Ravi Kannan, Hariharan Narayanan
185
Voted
ECBS
1996
IEEE
155views Hardware» more  ECBS 1996»
15 years 7 months ago
Model-Integrated Program Synthesis Environment
In this paper, it is shown that, through the use of Model-Integrated Program Synthesis MIPS, parallel real-time implementations of image processing data ows can be synthesized fro...
Janos Sztipanovits, Gabor Karsai, Hubertus Franke
139
Voted
MOBICOM
2012
ACM
13 years 6 months ago
RadioJockey: mining program execution to optimize cellular radio usage
Many networked applications that run in the background on a mobile device incur significant energy drains when using the cellular radio interface for communication. This is mainl...
Pavan K. Athivarapu, Ranjita Bhagwan, Saikat Guha,...