Sciweavers

769 search results - page 115 / 154
» Identifying objects in legacy systems
Sort
View
ICSE
2007
IEEE-ACM
14 years 1 months ago
Languages for Safety-Critical Software: Issues and Assessment
Safety-critical systems (whose anomalous behavior could have catastrophic consequences such as loss of human life) are becoming increasingly prevalent; standards such as DO-178B, ...
Benjamin M. Brosgol
ECRTS
2006
IEEE
14 years 1 months ago
Real-Time Memory Management: Life and Times
As real-time and embedded systems become increasingly large and complex, the traditional strictly static approach to memory management begins to prove untenable. The challenge is ...
Andrew Borg, Andy J. Wellings, Christopher D. Gill...
HICSS
2005
IEEE
123views Biometrics» more  HICSS 2005»
14 years 1 months ago
Enterprise Architecting: Critical Problems
An enterprise architecture (EA) identifies the main components of the organization, its information systems, the ways in which these components work together in order to achieve d...
Stephen H. Kaisler, Frank Armour, Michael Valivull...
CC
2001
Springer
121views System Software» more  CC 2001»
14 years 6 days ago
Constant-Time Root Scanning for Deterministic Garbage Collection
Root scanning is the task of identifying references to heap objects that are stored outside of the heap itself, in global and local variables and on the execution stack. Root scann...
Fridtjof Siebert
DIAGRAMS
2006
Springer
13 years 11 months ago
The Mathematics of Boundaries: A Beginning
The intuitive properties of configurations of planar non-overlapping closed curves (boundaries) are presented as a pure boundary mathematics. The mathematics, which is not incorpor...
William Bricken