Sciweavers

1897 search results - page 293 / 380
» Early application identification
Sort
View
ICSE
2000
IEEE-ACM
14 years 1 months ago
Reverse engineering: a roadmap
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased significantly with the shift toward web-based user interfaces...
Hausi A. Müller, Jens H. Jahnke, Dennis B. Sm...
PACS
2000
Springer
83views Hardware» more  PACS 2000»
14 years 1 months ago
A Comparison of Two Architectural Power Models
Reducing power, on both a per cycle basis and as the total energy used over the lifetime of an application, has become more important as small and embedded devices become increasi...
Soraya Ghiasi, Dirk Grunwald
RTAS
1997
IEEE
14 years 1 months ago
Efficient Run-Time Monitoring of Timing Constraints
A real-time system operates under timing constraints which it may be unable to meet under some circumstances. The criticality of a timing constraint determines how a system is to ...
Aloysius K. Mok, Guangtian Liu
NIL
1991
14 years 1 months ago
Deduction with Supernormal Defaults
In this paper we consider supernormal defaults [Poo88] with a strict partial order defining their priorities [Bre91]. We investigate their relation to minimal or preferential ent...
Stefan Brass
VLDB
1991
ACM
123views Database» more  VLDB 1991»
14 years 1 months ago
Rule Management in Object Oriented Databases: A Uniform Approach
Rules have been proposed for providing active behaviour in DBMS. Previous attempts to add rules to Object Oriented DBs have often resulted in a dichotomy between rules and other k...
Oscar Díaz, Norman W. Paton, Peter M. D. Gr...