Sciweavers

1448 search results - page 222 / 290
» From Requirements to Code Revisited
Sort
View
CONEXT
2008
ACM
13 years 12 months ago
High-throughput, reliable multicast without "crying babies" in wireless mesh networks
There are two primary challenges to supportinghigh-throughput, reliable multicast in wireless mesh networks (WMNs). The first is no different from unicast: wireless links are inhe...
Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun ...
DSN
2008
IEEE
13 years 12 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
DSVIS
2008
Springer
13 years 12 months ago
ReWiRe: Designing Reactive Systems for Pervasive Environments
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
ECTEL
2008
Springer
13 years 12 months ago
Bridging the Gap between Practitioners and E-Learning Standards: A Domain-Specific Modeling Approach
Developing a learning design using IMS Learning Design (LD) is difficult for average practitioners because a high overhead of pedagogical knowledge and technical knowledge is requi...
Yongwu Miao, Tim Sodhi, Francis Brouns, Peter B. S...
AAAI
2010
13 years 11 months ago
Evolving Compiler Heuristics to Manage Communication and Contention
As computer architectures become increasingly complex, hand-tuning compiler heuristics becomes increasingly tedious and time consuming for compiler developers. This paper presents...
Matthew E. Taylor, Katherine E. Coons, Behnam Roba...