Sciweavers

139 search results - page 26 / 28
» A Case Study on Naked Objects in Agile Software Development
Sort
View
CBSE
2005
Springer
14 years 4 months ago
A Component-Oriented Model for the Design of Safe Multi-threaded Applications
We previously developed a component-oriented model that combines ideas from self-organizing architectures and from design by contract to address the complexity of design in multi-t...
Reimer Behrends, R. E. Kurt Stirewalt, Laura K. Di...
GLOBECOM
2008
IEEE
13 years 11 months ago
Power Efficient Throughput Maximization in Multi-Hop Wireless Networks
Abstract-- We study the problem of total throughput maximization in arbitrary multi-hop wireless networks, with constraints on the total power usage (denoted by PETM), when nodes h...
Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marat...
ATVA
2010
Springer
142views Hardware» more  ATVA 2010»
13 years 8 months ago
On Scenario Synchronization
: Narrowing the wide conceptual gap between problem and implementation domains is considered a significant factor within software engineering. Currently, such a relation is often o...
Duc-Hanh Dang, Anh-Hoang Truong, Martin Gogolla
APSEC
2008
IEEE
14 years 5 months ago
Towards Unanticipated Runtime Adaptation of Java Applications
Modifying an application usually means to stop the application, apply the changes, and start the application again. That means, the application is not available for at least a sho...
Mario Pukall, Christian Kästner, Gunter Saake
WCRE
2008
IEEE
14 years 5 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou