Sciweavers

2018 search results - page 351 / 404
» Code Normal Forms
Sort
View
ICSM
2002
IEEE
14 years 1 months ago
A Technique for Dynamic Updating of Java Software
During maintenance, systems are updated to correct faults, improve functionality, and adapt the software to changes in its execution environment. The typical softwareupdate proces...
Alessandro Orso, Anup Rao, Mary Jean Harrold
IEEEPACT
2002
IEEE
14 years 1 months ago
Eliminating Exception Constraints of Java Programs for IA-64
Java exception checks are designed to ensure that any faulting instruction causing a hardware exception does not terminate the program abnormally. These checks, however, impose so...
Kazuaki Ishizaki, Tatsushi Inagaki, Hideaki Komats...
INFOCOM
2002
IEEE
14 years 1 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
ICMCS
2000
IEEE
89views Multimedia» more  ICMCS 2000»
14 years 1 months ago
A Performance Based Parametric Model for Facial Animation
In this paper we present a parametric model for facial animation and a method for adapting it to a specific person. Every facial expression can be described as a contraction or r...
Ania Wojdel, Léon J. M. Rothkrantz
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
14 years 1 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey