Sciweavers

179 search results - page 19 / 36
» Implementing BDI-like Systems by Direct Execution
Sort
View
SIGCOMM
1996
ACM
15 years 3 months ago
ASHs: Application-Specific Handlers for High-Performance Messaging
Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely an...
Deborah A. Wallach, Dawson R. Engler, M. Frans Kaa...
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 2 months ago
How soccer players would do stream joins
In spite of the omnipresence of parallel (multi-core) systems, the predominant strategy to evaluate window-based stream joins is still strictly sequential, mostly just straightfor...
Jens Teubner, René Müller
PADL
2009
Springer
16 years 10 days ago
Declarative Network Verification
Abstract. In this paper, we present our initial design and implementation of a declarative network verifier (DNV). DNV utilizes theorem proving, a well established verification tec...
Anduo Wang, Prithwish Basu, Boon Thau Loo, Oleg So...
DATE
2009
IEEE
122views Hardware» more  DATE 2009»
15 years 6 months ago
A MILP-based approach to path sensitization of embedded software
—We propose a new methodology based on Mixed Integer Linear Programming (MILP) for determining the input values that will exercise a specified execution path in a program. In or...
José C. Costa, José C. Monteiro
DLS
2009
150views Languages» more  DLS 2009»
14 years 9 months ago
Fast type reconstruction for dynamically typed programming languages
Type inference and type reconstruction derive static types for program elements that have no static type associated with them. They have a wide range of usage, such as helping to ...
Frédéric Pluquet, Antoine Marot, Roe...