Sciweavers

1140 search results - page 149 / 228
» Generating compilers for generated datapaths
Sort
View
ICICS
2005
Springer
15 years 8 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell
CP
2003
Springer
15 years 8 months ago
Box Constraint Collections for Adhoc Constraints
In this paper, we propose a new language-independent representation of adhoc constraints, called a box constraint collection. Using constructive disjunction, this representation ac...
Chi Kan Cheng, Jimmy Ho-Man Lee, Peter J. Stuckey
HOLOMAS
2009
Springer
15 years 7 months ago
Design and Implementation of LabVIEW-Based IEC61499 Compliant Device
The method of IEC 61499 compliant device implementation with the National Instruments LabVIEW is proposed. The work focuses on these aspects of the tasks of the event generation an...
Grzegorz Polaków, Mieczyslaw Metzger
CODES
2000
IEEE
15 years 7 months ago
Heterogeneous modeling and simulation of embedded systems in El Greco
This paper describes the functional specification and verification portions of El Greco, a system for high-level, heterogeneous functional specification, efficient compiled si...
Joseph Buck, Radha Vaidyanathan
ECOOP
2000
Springer
15 years 7 months ago
Empirical Study of Object-Layout Strategies and Optimization Techniques
Althoughthereisalargebodyofresearchonthetimeoverheadofobject oriented programs, there is little work on memory overhead. This paper takes an empirical approach to the study of this...
Natalie Eckel, Joseph Gil