Sciweavers

5186 search results - page 1029 / 1038
» Embedded Systems
Sort
View
VL
1997
IEEE
198views Visual Languages» more  VL 1997»
15 years 1 months ago
Behavior Processors: Layers between End-Users and Java Virtual Machines
Visual programming approaches are limited in their usefulness if they do not include a profile of their users that defines exactly who is attempting to solve what kind of problems...
Alexander Repenning, Andri Ioannidou
SIGMETRICS
1996
ACM
118views Hardware» more  SIGMETRICS 1996»
15 years 1 months ago
Integrating Performance Monitoring and Communication in Parallel Computers
A large and increasing gap exists between processor and memory speeds in scalable cache-coherent multiprocessors. To cope with this situation, programmers and compiler writers mus...
Margaret Martonosi, David Ofelt, Mark Heinrich
79
Voted
CHI
1994
ACM
15 years 1 months ago
User interface tools
A user interface software tool helps developers design and implement the user interface. Research on past tools has had enormous impact on today's developers--virtually all a...
Brad A. Myers, Dan R. Olsen
CODES
2009
IEEE
15 years 1 months ago
TotalProf: a fast and accurate retargetable source code profiler
Profilers play an important role in software/hardware design, optimization, and verification. Various approaches have been proposed to implement profilers. The most widespread app...
Lei Gao, Jia Huang, Jianjiang Ceng, Rainer Leupers...
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 1 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
« Prev « First page 1029 / 1038 Last » Next »