Sciweavers

3107 search results - page 354 / 622
» Error-Correcting Source Code
Sort
View
JSA
2007
84views more  JSA 2007»
15 years 3 months ago
Optimizing data structures at the modeling level in embedded multimedia
Traditional design techniques for embedded systems apply transformations on the source code to optimize hardwarerelated cost factors. Unfortunately, such transformations cannot ad...
Marijn Temmerman, Edgar G. Daylight, Francky Catth...
JSAC
2007
86views more  JSAC 2007»
15 years 3 months ago
Asymptotically optimal cooperative wireless networks with reduced signaling complexity
Abstract— This paper considers an orthogonal amplify-andforward (OAF) protocol for cooperative relay communication over Rayleigh-fading channels in which the intermediate relays ...
Petros Elia, Frédérique E. Oggier, P...
131
Voted
CC
2000
Springer
134views System Software» more  CC 2000»
15 years 3 months ago
Pipelined Java Virtual Machine Interpreters
The performance of a Java Virtual Machine (JVM) interpreter running on a very long instruction word (VLIW) processor can be improved by means of pipelining. While one bytecode is i...
Jan Hoogerbrugge, Lex Augusteijn
136
Voted
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
15 years 3 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler
124
Voted
JUCS
2010
98views more  JUCS 2010»
15 years 2 months ago
Embedding Hygiene-Compatible Macros in an Unhygienic Macro System
: It is known that the essential ingredients of a Lisp-style unhygienic macro system can be expressed in terms of advanced hygienic macro systems. We show that the reverse is also ...
Pascal Costanza, Theo D'Hondt