Sciweavers

1448 search results - page 122 / 290
» From Requirements to Code Revisited
Sort
View
PDP
2011
IEEE
14 years 7 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...
CASCON
1996
77views Education» more  CASCON 1996»
15 years 5 months ago
Harvesting design for an application framework
Framework design begins with domain analysis. Either the problem domain is analyzed to create a new design, or the solution domain is analyzed to understand how the problem has al...
Joan Boone
ICSE
2009
IEEE-ACM
16 years 4 months ago
TranStrL: An automatic need-to-translate string locator for software internationalization
Software internationalization is often necessary when distributing software applications to different regions around the world. In many cases, developers often do not internationa...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...
WWW
2011
ACM
14 years 11 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
146
Voted
ICSM
2002
IEEE
15 years 9 months ago
Migration to Object Oriented Platforms: A State Transformation Approach
Over the past years it has become evident that the benefits of object orientation warrant the design and development of reengineering methods that aim to migrate legacy procedural...
Ying Zou, Kostas Kontogiannis