Sciweavers

2043 search results - page 311 / 409
» Reasoning About Security Models
Sort
View
99
Voted
ISCA
2008
IEEE
150views Hardware» more  ISCA 2008»
15 years 7 months ago
Fetch-Criticality Reduction through Control Independence
Architectures that exploit control independence (CI) promise to remove in-order fetch bottlenecks, like branch mispredicts, instruction-cache misses and fetch unit stalls, from th...
Mayank Agarwal, Nitin Navale, Kshitiz Malik, Matth...
130
Voted
IFM
2007
Springer
245views Formal Methods» more  IFM 2007»
15 years 6 months ago
Co-simulation of Distributed Embedded Real-Time Control Systems
Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analys...
Marcel Verhoef, Peter Visser, Jozef Hooman, Jan F....
119
Voted
MM
2004
ACM
114views Multimedia» more  MM 2004»
15 years 6 months ago
ChucK: a programming language for on-the-fly, real-time audio synthesis and multimedia
In this paper, we describe ChucK – a programming language and programming model for writing precisely timed, concurrent audio synthesis and multimedia programs. Precise concurre...
Ge Wang, Perry R. Cook
ECOOP
2004
Springer
15 years 6 months ago
Typestates for Objects
Today’s mainstream object-oriented compilers and tools do not support declaring and statically checking simple pre- and postconditions on methods and invariants on object represe...
Robert DeLine, Manuel Fähndrich
104
Voted
KDD
1999
ACM
104views Data Mining» more  KDD 1999»
15 years 5 months ago
Learning Rules from Distributed Data
In this paper a concern about the accuracy (as a function of parallelism) of a certain class of distributed learning algorithms is raised, and one proposed improvement is illustrat...
Lawrence O. Hall, Nitesh V. Chawla, Kevin W. Bowye...