Sciweavers

109 search results - page 14 / 22
» Legacy Software Evaluation Model for Outsourced Maintainer
Sort
View
ICTAI
2008
IEEE
14 years 1 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang
DATE
2010
IEEE
195views Hardware» more  DATE 2010»
13 years 10 months ago
Cool MPSoC programming
Abstract--This paper summarizes a special session on multicore/multi-processor system-on-chip (MPSoC) programming challenges. Wireless multimedia terminals are among the key driver...
Rainer Leupers, Lothar Thiele, Xiaoning Nie, Bart ...
ICEIS
2000
IEEE
13 years 12 months ago
University Information System Fully Based on WWW
This paper describes the development of Information System (IS) at Masaryk University in Brno. It supports full range of administrative and information functions in the study area,...
Jan Pazdziora, Michal Brandejs
JTAER
2010
173views more  JTAER 2010»
13 years 6 months ago
An Assessment of Design Patterns' Influence on a Java-based E-Commerce Application
Design patterns, acting as recurring solutions to common problems, offer significant benefits such as avoiding unnecessary complexity, and promoting code reuse, maintainability an...
Maria Mouratidou, Vassilios Lourdas, Alexander Cha...
CCS
2008
ACM
13 years 9 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...