Sciweavers

1448 search results - page 262 / 290
» From Requirements to Code Revisited
Sort
View
HPDC
1999
IEEE
13 years 12 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
WACC
1999
ACM
13 years 12 months ago
Why do electronic conversations seem less polite? the costs and benefits of hedging
Electronic conversations often seem less polite than spoken conversations. The usual explanation for this is that people who are not physically copresent become depersonalized and...
Susan Brennan, Justina O. Ohaeri
DAC
1997
ACM
13 years 12 months ago
Static Timing Analysis of Embedded Software
This paper examines the problem of statically analyzing the performance of embedded software. This problem is motivated by the increasing growth of embedded systems and a lack of ...
Sharad Malik, Margaret Martonosi, Yau-Tsun Steven ...
ASPLOS
2009
ACM
13 years 11 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
BPM
2006
Springer
153views Business» more  BPM 2006»
13 years 11 months ago
Shop Floor Information Management and SOA
Service Science is a new term for a new paradigm which aims at the solution of an obvious problem: How to make the increasing fusion of business and IT successful in a dynamically ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...