Sciweavers

935 search results - page 99 / 187
» From Logic Programming Towards Multi-Agent Systems
Sort
View
CCS
2011
ACM
14 years 3 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
OSDI
2008
ACM
16 years 4 months ago
Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs
Deadlock is an increasingly pressing concern as the multicore revolution forces parallel programming upon the average programmer. Existing approaches to deadlock impose onerous bu...
Manjunath Kudlur, Scott A. Mahlke, Stéphane...
EMSOFT
2001
Springer
15 years 8 months ago
Giotto: A Time-Triggered Language for Embedded Programming
rovides an abstract programmer’s model for the implementation of embedded control systems with hard real-time constraints. A typical control application consists of periodic soft...
Thomas A. Henzinger, Benjamin Horowitz, Christoph ...
124
Voted
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
15 years 8 months ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu
141
Voted
JFP
2000
163views more  JFP 2000»
15 years 3 months ago
Automatic useless-code elimination for HOT functional programs
In this paper we present two type inference systems for detecting useless-code in higher-order typed functional programs. Type inference can be performed in an efficient and compl...
Ferruccio Damiani, Paola Giannini