Sciweavers

24529 search results - page 4865 / 4906
» Computing on Authenticated Data
Sort
View
JUCS
2008
115views more  JUCS 2008»
13 years 10 months ago
Capturing Interaction Requirements in a Model Transformation Technology Based on MDA
: Currently, many models are used to capture functional software requirements. However, the Software Engineering community has faded interaction requirements into the background, d...
José Ignacio Panach, Sergio España, ...
DPD
2007
86views more  DPD 2007»
13 years 10 months ago
Semantics based customization of UBL document schemas
Abstract. Universal Business Language (UBL) is an OASIS initiative to develop common business document schemas to provide document interoperability in the eBusiness domain. Since t...
Yalin Yarimagan, Asuman Dogac
ENTCS
2007
113views more  ENTCS 2007»
13 years 10 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
JSAC
2006
102views more  JSAC 2006»
13 years 10 months ago
A deterministic frequency-domain model for the indoor power line transfer function
The characterization of the transfer function of the power line (PL) channel is a nontrivial task that requires a truly interdisciplinary approach. Until recently, a common attribu...
S. Galli, Thomas C. Banwell
ENTCS
2007
116views more  ENTCS 2007»
13 years 10 months ago
Experiments in Cost Analysis of Java Bytecode
Recently, we proposed a general framework for the cost analysis of Java bytecode which can be used for measuring resource usage. This analysis generates, at compile-time, cost rel...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
« Prev « First page 4865 / 4906 Last » Next »