Sciweavers

3889 search results - page 588 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
CASES
2005
ACM
15 years 6 months ago
A post-compilation register reassignment technique for improving hamming distance code compression
Code compression is a field where compression ratios between compiler-generated code and subsequent compressed code are highly dependent on decisions made at compile time. Most op...
Montserrat Ros, Peter Sutton
CC
2002
Springer
145views System Software» more  CC 2002»
15 years 4 months ago
Forwarding in Attribute Grammars for Modular Language Design
Abstract. Forwarding is a technique for providing default attribute definitions in attribute grammars that is helpful in the modular implementation of programming languages. It com...
Eric Van Wyk, Oege de Moor, Kevin Backhouse, Paul ...
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 11 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
EMSOFT
2005
Springer
15 years 10 months ago
Using de-optimization to re-optimize code
The nature of embedded systems development places a great deal of importance on meeting strict requirements in areas such as static code size, power consumption, and execution tim...
Stephen Hines, Prasad Kulkarni, David B. Whalley, ...
ICCBSS
2004
Springer
15 years 9 months ago
Characterization of a Taxonomy for Business Applications and the Relationships Among Them
In this paper we propose a taxonomy for classifying COTS business applications, i.e. products that are used in the daily functioning of all types of organizations worldwide, such a...
Juan Pablo Carvallo, Xavier Franch, Carme Quer, Ma...