Sciweavers

4083 search results - page 710 / 817
» The EvA2 Optimization Framework
Sort
View
CGO
2010
IEEE
15 years 5 months ago
Umbra: efficient and scalable memory shadowing
Shadow value tools use metadata to track properties of application data at the granularity of individual machine instructions. These tools provide effective means of monitoring an...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe
ICCAD
1999
IEEE
148views Hardware» more  ICCAD 1999»
15 years 5 months ago
SAT based ATPG using fast justification and propagation in the implication graph
In this paper we present new methods for fast justification and propagation in the implication graph (IG) which is the core data structure of our SAT based implication engine. As ...
Paul Tafertshofer, Andreas Ganz
95
Voted
JIT
1999
Springer
123views Database» more  JIT 1999»
15 years 5 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm
108
Voted
ICPP
1998
IEEE
15 years 5 months ago
Concurrent SSA Form in the Presence of Mutual Exclusion
Most current compiler analysis techniques are unable to cope with the semantics introduced by explicit parallel and synchronization constructs in parallel programs. In this paper ...
Diego Novillo, Ronald C. Unrau, Jonathan Schaeffer
CISM
1993
149views GIS» more  CISM 1993»
15 years 4 months ago
The Weak Instance Model
The weak instance model is a framework to consider the relations in a database as a whole, regardless of the way attributes are grouped in the individual relations. Queries and upd...
Paolo Atzeni, Riccardo Torlone