Sciweavers

2013 search results - page 241 / 403
» Analysis and Design Techniques for Service-Oriented Developm...
Sort
View
IJSN
2006
124views more  IJSN 2006»
13 years 9 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
CHI
2007
ACM
14 years 9 months ago
Selection-based note-taking applications
The increasing integration of education and technology has led to the development of a range of note-taking applications. Our project's goal is to provide empirical data to g...
Aaron Bauer, Kenneth R. Koedinger
EUROSYS
2009
ACM
14 years 6 months ago
Tralfamadore: unifying source code and execution experience
Program source is an intermediate representation of software; it lies between a developer’s intention and the hardware’s execution. Despite advances in languages and developme...
Geoffrey Lefebvre, Brendan Cully, Michael J. Feele...
SOSYM
2010
176views more  SOSYM 2010»
13 years 7 months ago
On challenges of model transformation from UML to Alloy
Abstract The Unified Modeling Language (UML) is the de facto language used in the industry for software specifications. Once an application has been specified, Model Driven Arch...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
DAC
2011
ACM
12 years 9 months ago
Characterizing within-die and die-to-die delay variations introduced by process variations and SOI history effect
Variations in delay caused by within-die and die-to-die process variations and SOI history effect increase timing margins and reduce performance. In order to develop mitigation te...
Jim Aarestad, Charles Lamech, Jim Plusquellic, Dhr...