Sciweavers

204 search results - page 30 / 41
» Error-Set Codes and Related Objects
Sort
View
HICSS
2002
IEEE
152views Biometrics» more  HICSS 2002»
14 years 13 days ago
Security Considerations for Distributed Web-Based E-commerce Applications in Java
Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an ...
Timothy E. Lindquist
WCRE
2002
IEEE
14 years 11 days ago
A Methodology for Developing Transformations Using the Maintainability Soft-Goal Graph
Over the past few years, we are experiencing a surge of evolution problems related to legacy object-oriented systems. Object orientation provides means for systems to be well-desi...
Ladan Tahvildari, Kostas Kontogiannis
CBSE
2009
Springer
14 years 3 days ago
Extracting Behavior Specification of Components in Legacy Applications
A challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structur...
Tomás Poch, Frantisek Plasil
IPCCC
1999
IEEE
13 years 11 months ago
Accurately modeling speculative instruction fetching in trace-driven simulation
Performance evaluation of modern, highly speculative, out-of-order microprocessors and the corresponding production of detailed, valid, accurate results have become serious challe...
R. Bhargava, L. K. John, F. Matus
CGO
2008
IEEE
14 years 1 months ago
Automatic array inlining in java virtual machines
Array inlining expands the concepts of object inlining to arrays. Groups of objects and arrays that reference each other are placed consecutively in memory so that their relative ...
Christian Wimmer, Hanspeter Mössenböck