Sciweavers

780 search results - page 134 / 156
» Case Study: Model Transformations for Time-triggered Languag...
Sort
View
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
CASES
2009
ACM
14 years 2 months ago
Tight WCRT analysis of synchronous C programs
Accurate estimation of the tick length of a synchronous program is essential for efficient and predictable implementations that are devoid of timing faults. The techniques to dete...
Partha S. Roop, Sidharta Andalam, Reinhard von Han...
ICSE
2004
IEEE-ACM
14 years 7 months ago
Theme: An Approach for Aspect-Oriented Analysis and Design
Aspects are behaviours that are tangled and scattered across a system. In requirements documentation, aspects manifest themselves as descriptions of behaviours that are intertwine...
Elisa L. A. Baniassad, Siobhán Clarke
CANDC
2004
ACM
13 years 7 months ago
Identification of related gene/protein names based on an HMM of name variations
Gene and protein names follow few, if any, true naming conventions and are subject to great variation in different occurrences of the same name. This gives rise to two important p...
Lana Yeganova, Lawrence H. Smith, W. John Wilbur
HASKELL
2009
ACM
14 years 2 months ago
Parallel performance tuning for Haskell
Parallel Haskell programming has entered the mainstream with support now included in GHC for multiple parallel programming models, along with multicore execution support in the ru...
Don Jones Jr., Simon Marlow, Satnam Singh