Sciweavers

505 search results - page 50 / 101
» Implementation of Belief Change Operators Using BDDs
Sort
View
ISCA
2007
IEEE
103views Hardware» more  ISCA 2007»
15 years 4 months ago
Ginger: control independence using tag rewriting
The negative performance impact of branch mis-predictions can be reduced by exploiting control independence (CI). When a branch mis-predicts, the wrong-path instructions up to the...
Andrew D. Hilton, Amir Roth
ICSE
2008
IEEE-ACM
15 years 10 months ago
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks
Test-driven software development tackles the problem of operationally defining the features to be implemented by means of test cases. This approach was recently ported to the earl...
Filippo Ricca, Massimiliano Di Penta, Marco Torchi...
SIGSOFT
2006
ACM
15 years 3 months ago
Using task context to improve programmer productivity
When working on a large software system, a programmer typically spends an inordinate amount of time sifting through thousands of artifacts to find just the subset of information n...
Mik Kersten, Gail C. Murphy
ASPLOS
2011
ACM
14 years 1 months ago
NV-Heaps: making persistent objects fast and safe with next-generation, non-volatile memories
nt, user-defined objects present an attractive abstraction for working with non-volatile program state. However, the slow speed of persistent storage (i.e., disk) has restricted ...
Joel Coburn, Adrian M. Caulfield, Ameen Akel, Laur...
COMSWARE
2006
IEEE
15 years 3 months ago
Exploiting multi-channel clustering for power efficiency in sensor networks
Sensor networks typically comprise of a number of inexpensive small devices with processing, communication and sensing abilities that collaborate to perform a common task. Sensor d...
Ashima Gupta, Chao Gui, Prasant Mohapatra