Now showing items 292-311 of 671

    • Hardware Mechanisms for Memory Integrity Checking 

      Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas (2002-11)
      Memory integrity verification is a useful primitive when implementing secure processors that are resistant to attacks on hardware components. This paper proposes new hardware schemes to verify the integrity of untrusted ...
    • A Heuristic Approach to Alternate Routing in a Job Shop 

      Russo, F.J. (1965-06)
      The research reported here investigates the use of heuristics for selecting from several alternate routes resulting from partially ordered tasks in a job shop order file. The experimental vehicle employed was digital ...
    • Hierarchical Correctness Proofs for Distributed Algorithms 

      Lynch, Nancy A.; Tuttle, Mark S. (1987-04)
      This thesis introduces a new model for distributed computation in asynchronous networks, the input-output automaton. This simple, powerful model captures in a novel way the game-theoretical interaction between a system ...
    • High Level Expression of Semantic Integrity Specifications in a Relational Data Base System 

      McLeod, Dennis J. (1976-09)
      The "semantic integrity" of a data base is said to be violated when the data base ceases to represent a legitimate configuration of the application environment it is intended to model. In the context of the relational ...
    • High Level VAL Constructs in a Static Data Flow Machine 

      Todd, Kenneth Wayne (1981-06)
      The Dennis-Misunas Form 1 Data Flow Machine can best be described as a static and scalar machine. Despite these two limiting characteristics, it is still possible to translate the whole of the functional programming ...
    • A High-level Signal Processing Programming Language 

      Hicks, James Edward, Jr. (1988-03)
      The motivations for an abstract, diagrammatic signal processing language are presented along with a study of the semantics that such language should have. D-PICT, the proposed Digital Signal Processing Pictorial Language, ...
    • High-Performance All-Software Distributed Shared Memory 

      Johnson, Kirk L. (1996-02)
      The C Region Library (CRL) is a new all-software distributed shared memory (DSM) system. CRL requires no special compiler, hardware, or operating system support beyond the ability to send and receive messages between ...
    • A High-performance Retargetable Simulator for Parallel Architectures 

      Dellarocas, Chrysanthos N. (1991-06)
      The complexity of the interaction between software and hardware in MIMD machines makes experimental evaluation of parallel programs an import complement to theoretical analysis. Traditional techniques used to monitor the ...
    • A History of CLU 

      Liskov, Barbara H. (1993-09)
      The idea of a data abstraction has had a significant impact on the development of programming languages and on programming methodology. CLU was the first implemented programming language to provide direct linguistic support ...
    • HULA: An Efficient Protocol for Reliable Delivery of Messages 

      Maheshwari, Umesh (1997-07)
      We present a new protocol for reliable delivery of messages over a network that might lose, duplicate, reorder, or arbitrarily delay packets. It is the first protocol that guarantees exactly-once and ordered delivery on a ...
    • Hybrid I/O Automata* 

      Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits (2003-01)
      Hybrid systems are systems that exhibit a combination of discrete and continuous behavior. Typical hybrid systems include computer components, which operate in discrete program steps, and real-world components, whose ...
    • Hybrid I/O Automata* 

      Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits (2002-02)
      Hybrid systems are systems that exhibit a combination of discrete and continuous behavior. Typical hybrid systems include computer components, which operate in discrete program steps, and real-world components, whose ...
    • Hybrid I/O Automata* 

      Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits (2001-09)
      Hybrid systems are systems that exhibit a combination of discrete and continuous behavior. Typical hybrid systems include computer components, which operate in discrete program steps, and real-world components, whose ...
    • I-95 The Information Market 

      Unknown author (1993-08)
    • I/O Automaton Models and Proofs for Shared-Key Communication Systems 

      Lynch, Nancy A. (1999-08)
      The combination of two security protocols, a simple shared-key communication protocol and the Diffie-Hellman key distribution protocol, is modeled formally and proved correct. The modeling is based on the I/O automaton ...
    • ID World: An Environment for the Development of a Dataflow Programs Written in ID 

      Morais, Dinarte R. (1986-05)
      The ID WORLD involves the interfacing of a compiler, interpreter, debugger and editor mode to create an environment for the development of dataflow programs written in ID. It replaces the Tagged-Token Dataflow Architecture ...
    • Identifying and Merging Related Bibliographic Records 

      Hylton, Jeremy A. (1996-02)
      Bibliographic records freely available on the Internet can be used to construct a high-quality, digital finding aid that provides the ability to discover paper and electronic documents. The key challenge to providing ...
    • Immediate-Mode Ray-Casting 

      Alex, John; Teller, Seth (1999-06)
      We propose a simple modification to the classical polygon rasterization pipeline that enables exact, efficient raycasting of bounded implicit surfaces without the use of a global spatial data structure bounding hierarchy. ...
    • The Impact of Layer Assignment Methods on Layout Algorithms for Integrated Circuits 

      Pinter, Ron Yair (1983-08)
      Programs for integrated circuit layout at the module assembly level are typically decomposed into two phases - placement and routing. In this thesis we investigate a third phase which is often implicitly assumed - layer ...
    • An Implementation Scheme for Array Operations in Static Data Flow Computers 

      Guang-Rong, Gao (1982-05)
      The mapping of array operations in VAL programs on a static data flow machine with array memory is studied. The flow dependency graph is introduced as a model of array operations in VAL programs. The balancing and ...