Sciweavers

1994 search results - page 190 / 399
» Limited Software Warranties
Sort
View
ISORC
2003
IEEE
14 years 3 months ago
The Event-Triggered and Time-Triggered Medium-Access Methods
The processes of accessing a shared communication media have been extensively researched in the dependability and real-time area. For embedded systems, the primary approaches have...
Vilgot Claesson, Cecilia Ekelin, Neeraj Suri
METRICS
2003
IEEE
14 years 3 months ago
When Can We Test Less?
When it is impractical to rigorously assess all parts of complex systems, test engineers use defect detectors to focus their limited resources. In this article, we define some pr...
Tim Menzies, Justin S. Di Stefano, Kareem Ammar, K...
SISW
2003
IEEE
14 years 3 months ago
Implementation of a Storage Mechanism for Untrusted DBMSs
Several architectures have been recently proposed that store relational data in encrypted form on untrusted relational databases. Such architectures permit the creation of novel I...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ERLANG
2003
ACM
14 years 3 months ago
Extending the VoDKA architecture to improve resource modelling
VoDKA is a Video-on-Demand server developed using Erlang/OTP. In this paper, the evolution of the core architecture of the system, designed for improving resource modelling, is de...
Juan José Sánchez Penas, Carlos Abal...
UIST
2003
ACM
14 years 3 months ago
A molecular architecture for creating advanced GUIs
This paper presents a new GUI architecture for creating advanced interfaces. This model is based on a limited set of general principles that improve flexibility and provide capabi...
Eric Lecolinet