Sciweavers

595 search results - page 55 / 119
» Using Constraints with Memory to Implement Variable Eliminat...
Sort
View
CASES
2006
ACM
15 years 9 months ago
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...
Lan S. Bai, Lei Yang, Robert P. Dick
MOBISYS
2011
ACM
14 years 6 months ago
Using mobile phones to write in air
The ability to note down small pieces of information, quickly and easily, can be useful. This paper proposes a system called PhonePoint Pen that uses the in-built accelerometer in...
Sandip Agrawal, Ionut Constandache, Shravan Gaonka...
113
Voted
CP
2008
Springer
15 years 5 months ago
Perfect Derived Propagators
When implementing a propagator for a constraint, one must decide about variants: When implementing min, should one also implement max? Should one implement linear equations both wi...
Christian Schulte, Guido Tack
GECCO
2005
Springer
15 years 9 months ago
Theme preservation and the evolution of representation
The identification of mechanisms by which constraints on phenotypic variability are tuned in nature, and the implementation of these mechanisms in Evolutionary Algorithms (EAs) ca...
Keki M. Burjorjee, Jordan B. Pollack
140
Voted
PLDI
1999
ACM
15 years 7 months ago
Pointer Analysis for Multithreaded Programs
This paper presents a novel interprocedural, ow-sensitive, and context-sensitive pointer analysis algorithm for multithreaded programs that may concurrently update shared pointers...
Radu Rugina, Martin C. Rinard