Sciweavers

10585 search results - page 1913 / 2117
» The Orc Programming Language
Sort
View
LOBJET
2006
196views more  LOBJET 2006»
15 years 23 days ago
Mapping High-Level Business Rules To and Through Aspects
Many object-oriented software applications contain implicit business rules. Although there exist many approaches that advocate the separation of rules, the rules' connections ...
María Agustina Cibrán, Maja D'Hondt,...
124
Voted
ASE
2005
137views more  ASE 2005»
15 years 22 days ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
126
Voted
TOPLAS
2008
138views more  TOPLAS 2008»
15 years 22 days ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
LCTRTS
2010
Springer
14 years 10 months ago
Compiler directed network-on-chip reliability enhancement for chip multiprocessors
Chip multiprocessors (CMPs) are expected to be the building blocks for future computer systems. While architecting these emerging CMPs is a challenging problem on its own, program...
Ozcan Ozturk, Mahmut T. Kandemir, Mary Jane Irwin,...
130
Voted
IEEEPACT
2009
IEEE
14 years 10 months ago
Region Based Structure Layout Optimization by Selective Data Copying
As the gap between processor and memory continues to grow, memory performance becomes a key performance bottleneck for many applications. Compilers therefore increasingly seek to m...
Sandya S. Mannarswamy, Ramaswamy Govindarajan, Ris...
« Prev « First page 1913 / 2117 Last » Next »