Sciweavers

2000 search results - page 328 / 400
» Program Transformation and Proof Transformation
Sort
View
144
Voted
LCPC
1999
Springer
15 years 7 months ago
An Empirical Study of Function Pointers Using SPEC Benchmarks
Since the C language imposes little restriction on the use of function pointers, the task of call graph construction for a C program is far more di cult than what the algorithms d...
Ben-Chung Cheng, Wen-mei W. Hwu
109
Voted
OOPSLA
1999
Springer
15 years 7 months ago
Practical Experience with an Application Extractor for Java
Java programs are routinely transmitted over low-bandwidth network connections as compressed class le archives (i.e., zip les and jar les). Since archive size is directly proporti...
Frank Tip, Chris Laffra, Peter F. Sweeney, David S...
155
Voted
ICPP
1998
IEEE
15 years 7 months ago
A memory-layout oriented run-time technique for locality optimization
Exploiting locality at run-time is a complementary approach to a compiler approach for those applications with dynamic memory access patterns. This paper proposes a memory-layout ...
Yong Yan, Xiaodong Zhang, Zhao Zhang
CIA
1998
Springer
15 years 7 months ago
Multiagent Systems in Information-Rich Environments
Information-rich environments are the open environments that characterize most of the modern applications of computing technology. The applications include ubiquitous information a...
Michael N. Huhns, Munindar P. Singh
IRREGULAR
1998
Springer
15 years 7 months ago
The Distributed Object-Oriented Threads System DOTS
Abstract. We describe the design and implementation of the Distributed ObjectOriented Threads System (DOTS). This system is a complete redesign of the Distributed Threads System (D...
Wolfgang Blochinger, Wolfgang Küchlin, Andrea...