Sciweavers

1512 search results - page 218 / 303
» When Suboptimal Rules
Sort
View
106
Voted
ICFP
2008
ACM
16 years 22 days ago
Typed closure conversion preserves observational equivalence
Language-based security relies on the assumption that all potential attacks are bound by the rules of the language in question. When programs are compiled into a different languag...
Amal Ahmed, Matthias Blume
94
Voted
PERCOM
2007
ACM
16 years 11 days ago
Good Manners for Pervasive Computing--An Approach Based on the Ambient Calculus
When people interact, they follow distinct rules that coordinate the order of speech, who opens doors, whom and how to greet, and many things more. Such a social codex depends on ...
Gregor Schiele, Marcus Handte, Christian Becker
91
Voted
MOBISYS
2003
ACM
16 years 11 days ago
Reservations for Conflict Avoidance in a Mobile Database System
Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...
Nuno M. Preguiça, José Legatheaux Ma...
116
Voted
ICCD
2004
IEEE
119views Hardware» more  ICCD 2004»
15 years 9 months ago
I/O Clustering in Design Cost and Performance Optimization for Flip-Chip Design
I/O placement has always been a concern in modern IC design. Due to flip-chip technology, I/O can be placed throughout the whole chip without long wires from the periphery of the...
Hung-Ming Chen, I-Min Liu, Martin D. F. Wong, Muzh...
117
Voted
ASM
2010
ASM
15 years 7 months ago
A Basis for Feature-Oriented Modelling in Event-B
Abstract. Feature-oriented modelling is a well-known approach for Software Product Line (SPL) development. It is a widely used method when developing groups of related software. Wi...
Jennifer Sorge, Michael Poppleton, Michael Butler