Sciweavers

19986 search results - page 3833 / 3998
» On Designing Software Architectures
Sort
View
153
Voted
JUCS
2000
102views more  JUCS 2000»
15 years 3 months ago
Towards Two-Level Formal Modeling of Computer-Based Systems
: Embedded Computer-based Systems are becoming highly complex and hard to implement because of the large number of concerns the designers have to address. These systems are tightly...
Gabor Karsai, Greg Nordstrom, Ákos Lé...
143
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Cross-language, type-safe, and transparent object sharing for co-located managed runtimes
As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, object-oriented (OO) programming langua...
Michal Wegiel, Chandra Krintz
148
Voted
SCP
2010
155views more  SCP 2010»
15 years 1 months ago
Type inference and strong static type checking for Promela
The SPIN model checker and its specification language Promela have been used extensively in industry and academia to check logical properties of distributed algorithms and protoc...
Alastair F. Donaldson, Simon J. Gay
114
Voted
TALG
2010
86views more  TALG 2010»
15 years 1 months ago
Approximating corridors and tours via restriction and relaxation techniques
Given a rectangular boundary partitioned into rectangles, the Minimum-Length Corridor (MLC-R) problem consists of finding a corridor of least total length. A corridor is a set of ...
Arturo Gonzalez-Gutierrez, Teofilo F. Gonzalez
147
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...
« Prev « First page 3833 / 3998 Last » Next »