Sciweavers

5101 search results - page 786 / 1021
» Capturing Context Requirements
Sort
View
SPAA
1998
ACM
14 years 17 days ago
Computation-Centric Memory Models
We present a computation-centric theory of memory models. Unlike traditional processor-centric models, computation-centric models focus on the logical dependencies among instructi...
Matteo Frigo, Victor Luchangco
STOC
1998
ACM
125views Algorithms» more  STOC 1998»
14 years 17 days ago
Spot-Checkers
On Labor Day weekend, the highway patrol sets up spot-checks at random points on the freeways with the intention of deterring a large fraction of motorists from driving incorrectl...
Funda Ergün, Sampath Kannan, Ravi Kumar, Roni...
ICSM
1997
IEEE
14 years 16 days ago
MORALE. Mission ORiented Architectural Legacy Evolution
Software evolution is the most costly and time consuming software development activity. Yet software engineering research is predominantly concerned with initial development. MORA...
Gregory D. Abowd, Ashok K. Goel, Dean F. Jerding, ...
TAGT
1998
Springer
243views Graph Theory» more  TAGT 1998»
14 years 16 days ago
Double-Pullback Graph Transitions: A Rule-Based Framework with Incomplete Information
Reactive systems perform their tasks through interaction with their users or with other systems (as parts of a bigger system). An essential requirement for modeling such systems is...
Hartmut Ehrig, Reiko Heckel, Mercè Llabr&ea...
SIGCOMM
1997
ACM
14 years 15 days ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo