Sciweavers

882 search results - page 145 / 177
» A Taste of Rewrite Systems
Sort
View
SAC
2006
ACM
14 years 2 months ago
Making tuple spaces physical with RFID tags
In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea – rooted in a more general sc...
Marco Mamei, Renzo Quaglieri, Franco Zambonelli
OOPSLA
2004
Springer
14 years 2 months ago
A language-independent approach to software maintenance using grammar adapters
A long-standing goal of software engineering is to construct software that is easily modified and extended. Recent advances in software design techniques, such as aspect-oriented ...
Suman Roychoudhury
INAP
2001
Springer
14 years 1 months ago
Towards Reconciling Use Cases via Controlled Language and Graphical Models
Abstract. In requirements engineering use cases are employed to describe the ow of events and the occurrence of states in a future information system. Use cases consist of a set of...
Kathrin Böttger, Rolf Schwitter, Diego Moll&a...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 27 days ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
14 years 24 days ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe