Sciweavers

8503 search results - page 1432 / 1701
» Secure Software Architectures
Sort
View
SIGSOFT
1998
ACM
14 years 3 months ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin
LCTRTS
1998
Springer
14 years 3 months ago
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques
Abstract. Previously published methods for estimation of the worstcase execution time on contemporary processors with complex pipelines and multi-level memory hierarchies result in...
Thomas Lundqvist, Per Stenström
ICPP
1997
IEEE
14 years 3 months ago
Automatic Parallelization and Scheduling of Programs on Multiprocessors using CASCH
r The lack of a versatile software tool for parallel program development has been one of the major obstacles for exploiting the potential of high-performance architectures. In this...
Ishfaq Ahmad, Yu-Kwong Kwok, Min-You Wu, Wei Shu
WER
1998
Springer
14 years 3 months ago
Towards Requirements Engineering of Active Database Systems
Active systems are emerging in many fields, being particularly interesting those like Active Database Management Systems which always provide some kind of reactive capabilities. I...
José Hilario Canós Cerdá, Jav...
UIST
1997
ACM
14 years 3 months ago
An Interactive Visual Query Environment for Exploring Data
Direct manipulation of visualizations is a powerful technique for performing exploratory data operations such as navigation, aggregation, and filtering. Its immediacy facilitates ...
Mark Derthick, John Kolojejchick, Steven F. Roth
« Prev « First page 1432 / 1701 Last » Next »