Sciweavers

1448 search results - page 91 / 290
» From Requirements to Code Revisited
Sort
View
145
Voted
NETWORK
2008
150views more  NETWORK 2008»
15 years 3 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
149
Voted
ISPAN
2008
IEEE
15 years 10 months ago
Task Parallelism for Object Oriented Programs
Parallel computing is notoriously challenging due to the difficulty in developing correct and efficient programs. With the arrival of multi-core processors for desktop systems, ...
Nasser Giacaman, Oliver Sinnen
JCP
2007
88views more  JCP 2007»
15 years 3 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
OOPSLA
2009
Springer
15 years 8 months ago
An exploration of program as language
In this paper we explore the idea that the code that constitutes a program actually forms a higher-level, program specific language. The symbols of the language are the abstracti...
Elisa L. A. Baniassad, Clayton G. Myers
ICDCS
1996
IEEE
15 years 8 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...