Sciweavers

8503 search results - page 1426 / 1701
» Secure Software Architectures
Sort
View
CGO
2003
IEEE
14 years 4 months ago
Speculative Register Promotion Using Advanced Load Address Table (ALAT)
The pervasive use of pointers with complicated patterns in C programs often constrains compiler alias analysis to yield conservative register allocation and promotion. Speculative...
Jin Lin, Tong Chen, Wei-Chung Hsu, Pen-Chung Yew
COMPSAC
2003
IEEE
14 years 4 months ago
Scalable Multilateral Communication Technique for Large-Scale Information Systems
Autonomous Community Information System (ACIS) is a proposition made to contend with the extreme dynamism in the large-scale information system. ACIS is a decentralized bilateral-...
Khaled Ragab, Naohiro Kaji, Koichi Moriyama, Kinji...
ICSM
2003
IEEE
14 years 4 months ago
Mining Design Patterns from C++ Source Code
Design patterns are micro architectures that have proved to be reliable, easy-to implement and robust. There is a need in science and industry for recognizing these patterns. We p...
Zsolt Balanyi, Rudolf Ferenc
ISPASS
2003
IEEE
14 years 4 months ago
Performance analysis and optimization of a distributed Video on Demand service
Video on Demand (VoD) services are very appealing these days. In this work, we discuss four distinct alternatives for the architecture of a VoD server and compare their performanc...
Daniela Alvim Seabra dos Santos, Alex Borges Vieir...
AOSD
2003
ACM
14 years 4 months ago
Model-view-controller and object teams: a perfect match of paradigms
From the early days of object-oriented programming, the model-view-controller paradigm has been pursued for a clear design which separates different responsibilities within an in...
Matthias Veit, Stephan Herrmann
« Prev « First page 1426 / 1701 Last » Next »