Sciweavers

1004 search results - page 69 / 201
» Safe Constraint Queries
Sort
View
DATE
2003
IEEE
186views Hardware» more  DATE 2003»
14 years 2 months ago
Formal Methods for Integration of Automotive Software
Novel functionality, configurability and higher efficiency in automotive systems require sophisticated embedded software, as well as distributed software development between man...
Marek Jersak, Kai Richter, Rolf Ernst, Jörn-C...
MOBILWARE
2009
ACM
14 years 1 months ago
Trends in Mobile Application Development
Major software companies, such as Apple and Google, are disturbing the relatively safe and established actors of the mobile application business. These newcomers have caused signi...
Adrian Holzer, Jan Ondrus
IWPC
1998
IEEE
14 years 1 months ago
Design Pattern Recovery in Object-Oriented Software
An approach to recover object oriented design patterns from design and code is presented. The pattern recovery process is based on a multi-stage filtering strategy to avoid combin...
Giuliano Antoniol, Roberto Fiutem, L. Cristoforett...
AAAI
2008
13 years 11 months ago
A Reductive Semantics for Counting and Choice in Answer Set Programming
In a recent paper, Ferraris, Lee and Lifschitz conjectured that the concept of a stable model of a first-order formula can be used to treat some answer set programming expressions...
Joohyung Lee, Vladimir Lifschitz, Ravi Palla
NETWORKING
2007
13 years 10 months ago
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts
Abstract. Our Token Based Switch (TBS) implementation shows that a packetbased admission control system can be used to dynamically select a fast end-to-end connection over a hybrid...
Mihai-Lucian Cristea, Leon Gommans, Li Xu, Herbert...