Sciweavers

472 search results - page 22 / 95
» Modelling Producer Consumer Constraints
Sort
View
CPE
1994
Springer
170views Hardware» more  CPE 1994»
15 years 1 months ago
Automatic Scalability Analysis of Parallel Programs Based on Modeling Techniques
When implementingparallel programs forparallel computer systems the performancescalability of these programs should be tested and analyzed on different computer configurations and...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...
HOST
2011
IEEE
13 years 9 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
VMCAI
2004
Springer
15 years 3 months ago
Construction of a Semantic Model for a Typed Assembly Language
Typed Assembly Languages (TALs) can be used to validate the safety of assembly-language programs. However, typing rules are usually trusted as axioms. In this paper, we show how to...
Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao...
GMP
2000
IEEE
118views Solid Modeling» more  GMP 2000»
15 years 2 months ago
A System for Constructing Boundary Representation Solid Models from a Two-Dimensional Sketch
This paper describes a system which converts a twodimensional sketch with hidden lines removed of a single polyhedral object into a boundary representation solid model. The system...
P. A. C. Varley, Ralph R. Martin
ESEC
1999
Springer
15 years 1 months ago
A Component and Communication Model for Push Systems
We present a communication and component model for push systems. Surprisingly, despite the widespread use of many push services on the Internet, no such models exist. Our communica...
Manfred Hauswirth, Mehdi Jazayeri