Sciweavers

635 search results - page 73 / 127
» Automatic Discovery of Network Applications: A Hybrid Approa...
Sort
View
PEPM
2009
ACM
14 years 8 days ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
DAC
2007
ACM
14 years 8 months ago
Program Mapping onto Network Processors by Recursive Bipartitioning and Refining
Mapping packet processing applications onto embedded network processors (NP) is a challenging task due to the unique constraints of NP systems and the characteristics of network a...
Jia Yu, Jingnan Yao, Jun Yang 0002, Laxmi N. Bhuya...
CSREAESA
2006
13 years 9 months ago
Power Optimization of Interconnection Networks for Transport Triggered Architecture
Transport triggered architecture (TTA) has been shown to provide an efficient way to design application specific instruction set processors. However, the interconnection network of...
Xue-mi Zhao, Zhiying Wang
TSC
2008
209views more  TSC 2008»
13 years 7 months ago
Effective Web Service Composition in Diverse and Large-Scale Service Networks
Web services are considered to be a potential silver bullet for the envisioned Service Oriented Architecture, in which loosely coupled software components are published, located, a...
Seog-Chan Oh, Dongwon Lee, Soundar R. T. Kumara
IJCIS
2007
101views more  IJCIS 2007»
13 years 7 months ago
Applying MDE to the Development of Flexible and Reusable Wireless Sensor Networks
by allowing designers to model their systems at different abstraction levels, providing them omatic model transformations to incrementally refine abstract models into more concrete...
Cristina Vicente-Chicote, Fernando Losilla, B&aacu...