Sciweavers

1512 search results - page 218 / 303
» When Suboptimal Rules
Sort
View
ICFP
2008
ACM
15 years 11 months ago
Typed closure conversion preserves observational equivalence
Language-based security relies on the assumption that all potential attacks are bound by the rules of the language in question. When programs are compiled into a different languag...
Amal Ahmed, Matthias Blume
PERCOM
2007
ACM
15 years 10 months ago
Good Manners for Pervasive Computing--An Approach Based on the Ambient Calculus
When people interact, they follow distinct rules that coordinate the order of speech, who opens doors, whom and how to greet, and many things more. Such a social codex depends on ...
Gregor Schiele, Marcus Handte, Christian Becker
MOBISYS
2003
ACM
15 years 10 months ago
Reservations for Conflict Avoidance in a Mobile Database System
Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...
Nuno M. Preguiça, José Legatheaux Ma...
ICCD
2004
IEEE
119views Hardware» more  ICCD 2004»
15 years 8 months ago
I/O Clustering in Design Cost and Performance Optimization for Flip-Chip Design
I/O placement has always been a concern in modern IC design. Due to flip-chip technology, I/O can be placed throughout the whole chip without long wires from the periphery of the...
Hung-Ming Chen, I-Min Liu, Martin D. F. Wong, Muzh...
ASM
2010
ASM
15 years 6 months ago
A Basis for Feature-Oriented Modelling in Event-B
Abstract. Feature-oriented modelling is a well-known approach for Software Product Line (SPL) development. It is a widely used method when developing groups of related software. Wi...
Jennifer Sorge, Michael Poppleton, Michael Butler