Sciweavers

2200 search results - page 264 / 440
» Programming norm change
Sort
View
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 9 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
ICSM
2008
IEEE
15 years 9 months ago
Non-invasive and non-scattered annotations for more robust pointcuts
Annotations are often mentioned as a potential alternative to tackle the fragile nature of AspectJ pointcuts. However, annotations themselves can be considered crosscutting elemen...
Leonardo Silva, Samuel Domingues, Marco Tulio de O...
AHS
2007
IEEE
269views Hardware» more  AHS 2007»
15 years 8 months ago
Automatic Synthesis of Fault Detection Modules for Mobile Robots
In this paper, we present a new approach for automatic synthesis of fault detection modules for autonomous mobile robots. The method relies on the fact that hardware faults typica...
Anders Lyhne Christensen, Rehan O'Grady, Mauro Bir...
ICMCS
2007
IEEE
149views Multimedia» more  ICMCS 2007»
15 years 8 months ago
Joint Source Coding and Data Rate Adaptation for Multi-User Wireless Video Transmission
Much attention has been paid to the problem of optimally utilizing resources such as spectrum, power and time in order to achieve the best video delivery quality in wireless commu...
Fan Zhai, Zhu Li, Aggelos K. Katsaggelos
133
Voted
IWPSE
2007
IEEE
15 years 8 months ago
How documentation evolves over time
Good source code documentation, especially of programming interfaces, is essential for using and maintaining software components. In this paper, we present the Quasoledo tool that...
Daniel Schreck, Valentin Dallmeier, Thomas Zimmerm...