Sciweavers

1286 search results - page 173 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
PPOPP
2005
ACM
14 years 3 months ago
Composable memory transactions
Writing concurrent programs is notoriously difficult, and is of increasing practical importance. A particular source of concern is n correctly-implemented concurrency abstraction...
Tim Harris, Simon Marlow, Simon L. Peyton Jones, M...
ISORC
1999
IEEE
14 years 2 months ago
Applying Use Cases for the Requirements Validation of Component-Based Real-Time Software
Component-based software development is a promising way to improve quality, time to market and handle the increasing complexity of software for real-time systems. In this paper th...
Wolfgang Fleisch
IPPS
1998
IEEE
14 years 2 months ago
Measuring the Vulnerability of Interconnection Networks in Embedded Systems
Studies of the fault-tolerance of graphs have tended to largely concentrate on classical graph connectivity. This measure is very basic, and conveys very little information for des...
Vijay Lakamraju, Zahava Koren, Israel Koren, C. Ma...
SAC
2000
ACM
14 years 2 months ago
WCML: Paving the Way for Reuse in Object-Oriented Web Engineering
Since 1990 the Web has changed from a distributed hypertext system to an efficient environment for application delivery. Due to the legacy of the Web implementation model the deve...
Martin Gaedke, Christian Segor, Hans-Werner Geller...
MOBIHOC
2008
ACM
14 years 9 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...