Sciweavers

1312 search results - page 252 / 263
» Embedded contract languages
Sort
View
PODS
2008
ACM
178views Database» more  PODS 2008»
15 years 10 months ago
The chase revisited
We revisit the classical chase procedure, studying its properties as well as its applicability to standard database problems. We settle (in the negative) the open problem of decid...
Alin Deutsch, Alan Nash, Jeffrey B. Remmel
EUROSYS
2010
ACM
15 years 7 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
PEPM
2010
ACM
15 years 6 months ago
Optimizing relational algebra operations using generic equivalence discriminators and lazy products
We show how to efï¬ciently evaluate generic map-ï¬lter-product queries, generalizations of select-project-join (SPJ) queries in relational algebra, based on a combination of two...
Fritz Henglein
CSE
2009
IEEE
15 years 4 months ago
Implementing Social Norms Using Policies
—Multi-agent systems are difï¬cult to develop. One reason for this is that agents are embedded in a society where all agents must agree to obey certain social norms in order for...
Robert Kremer
CGO
2008
IEEE
15 years 4 months ago
Modulo scheduling for highly customized datapaths to increase hardware reusability
In the embedded domain, custom hardware in the form of ASICs is often used to implement critical parts of applications when performance and energy efï¬ciency goals cannot be met ...
Kevin Fan, Hyunchul Park, Manjunath Kudlur, Scott ...