Sciweavers

2344 search results - page 382 / 469
» Generating from a Deep Structure
Sort
View
WACC
1999
ACM
15 years 3 months ago
Supporting the writing of reports in a hierarchical organization
In many hierarchical companies, reports from several independent groups must be merged to form a single, companywide report. This paper describes a process and system for creating...
Andreas Girgensohn
ISSS
1999
IEEE
168views Hardware» more  ISSS 1999»
15 years 3 months ago
Automatic Architectural Synthesis of VLIW and EPIC Processors
This paper describes a mechanism for automatic design and synthesis of very long instruction word (VLIW), and its generalization, explicitly parallel instruction computing rocesso...
Shail Aditya, B. Ramakrishna Rau, Vinod Kathail
TOOLS
1999
IEEE
15 years 3 months ago
Associations as a Language Construct
stone in the object-oriented paradigm is the abstraction mechanisms transcending analysis, design, and implementation. The notions of class, object, behaviour, and inheritance are...
Kasper Østerbye
COMPSAC
1998
IEEE
15 years 3 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 3 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...