Sciweavers

627 search results - page 16 / 126
» Programming multi-core architectures using Data-Flow techniq...
Sort
View
66
Voted
SAC
2006
ACM
15 years 3 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
ZUM
2000
Springer
132views Formal Methods» more  ZUM 2000»
15 years 1 months ago
A Formal Architecture for the 3APL Agent Programming Language
Abstract. The notion of agents has provided a way of imbuing traditional computing systems with an extra degree of flexibility that allows them to be more resilient and robust in t...
Mark d'Inverno, Koen V. Hindriks, Michael Luck
I3E
2003
100views Business» more  I3E 2003»
14 years 10 months ago
Use of Models and Modelling Techniques for Service Development
: E-applications are increasingly being composed from individual services that can be realized with different technologies, such as, e.g., Web Services and standard component techn...
Luís Ferreira Pires, Marten van Sinderen, C...
POPL
2003
ACM
15 years 9 months ago
Bitwidth aware global register allocation
Multimedia and network processing applications make extensive use of subword data. Since registers are capable of holding a full data word, when a subword variable is assigned a r...
Sriraman Tallam, Rajiv Gupta
DAC
2003
ACM
15 years 10 months ago
Embedded intelligent SRAM
Many embedded systems use a simple pipelined RISC processor for computation and an on-chip SRAM for data storage. We present an enhancement called Intelligent SRAM (ISRAM) that co...
Prabhat Jain, G. Edward Suh, Srinivas Devadas