Sciweavers

568 search results - page 89 / 114
» Enforcing traceability in software
Sort
View
SIGSOFT
2007
ACM
14 years 10 months ago
Detection and resolution of atomicity violation in service composition
Atomicity is a desirable property that safeguards application consistency for service compositions. A service composition exhibiting this property could either complete or cancel ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu
INFOCOM
2009
IEEE
14 years 4 months ago
PHY Aided MAC - A New Paradigm
—Network protocols have traditionally been designed using a layered method in part because it is easier to implement some portions of network protocols in software and other port...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...
IPSN
2007
Springer
14 years 4 months ago
Interface contracts for TinyOS
TinyOS applications are built with software components that communicate through narrow interfaces. Since components enable finegrained code reuse, this approach has been successf...
Will Archer, Philip Levis, John Regehr
OOPSLA
2007
Springer
14 years 4 months ago
Living in the comfort zone
A comfort zone is a tested region of a system’s input space within which it has been observed to behave acceptably. To keep systems operating within their comfort zones, we advo...
Martin C. Rinard
ICSE
2010
IEEE-ACM
14 years 2 months ago
Using twinning to adapt programs to alternative APIs
We describe twinning and its applications to adapting programs to alternative APIs. Twinning is a simple technique that allows programmers to specify a class of program changes, i...
Marius Nita, David Notkin