Sciweavers

1631 search results - page 59 / 327
» Extreme Programming - Back to Basics
Sort
View
165
Voted
CADE
2008
Springer
16 years 2 months ago
Exploring Model-Based Development for the Verification of Real-Time Java Code
Many safety- and security-critical systems are real-time systems and, as a result, tools and techniques for verifying real-time systems are extremely important. Simulation and test...
Niusha Hakimipour, Paul A. Strooper, Roger Duke
PLDI
2000
ACM
15 years 7 months ago
Caching function calls using precise dependencies
This paper describes the implementation of a purely functional programming language for building software systems. In this language, external tools like compilers and linkers are ...
Allan Heydon, Roy Levin, Yuan Yu
AMINING
2003
Springer
293views Data Mining» more  AMINING 2003»
15 years 7 months ago
Data Mining Oriented CRM Systems Based on MUSASHI: C-MUSASHI
Abstract. MUSASHI is a set of commands which enables us to efficiently execute various types of data manipulations in a flexible manner, mainly aiming at data processing of huge a...
Katsutoshi Yada, Yukinobu Hamuro, Naoki Katoh, Tak...
186
Voted
USITS
2003
15 years 3 months ago
Adaptive Overload Control for Busy Internet Servers
As Internet services become more popular and pervasive, a critical problem that arises is managing the performance of services under extreme overload. This paper presents a set of...
Matt Welsh, David E. Culler
EOR
2006
65views more  EOR 2006»
15 years 2 months ago
Dynamic programming and minimum risk paths
: This paper addresses the problem of computing minimum risk paths by taking as objective the expected accident cost. The computation is based on a dynamic programming formulation ...
Paolo Serafini