Sciweavers

8503 search results - page 1461 / 1701
» Secure Software Architectures
Sort
View
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
14 years 3 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
INFOCOM
2003
IEEE
14 years 3 months ago
Integration of 802.11 and Third-Generation Wireless Data Networks
Abstract— The third-generation (3G) wide area wireless networks and 802.11 local area wireless networks possess complementary characteristics. 3G networks promise to offer always...
Milind M. Buddhikot, Girish P. Chandranmenon, Seun...
SIGSOFT
2003
ACM
14 years 3 months ago
Refinements and multi-dimensional separation of concerns
1 Step-wise refinement (SWR) asserts that complex programs can be derived from simple programs by progressively adding features. The length of a program specification is the number...
Don S. Batory, Jia Liu, Jacob Neal Sarvela
EMSOFT
2001
Springer
14 years 2 months ago
Adaptive and Reflective Middleware for Distributed Real-Time and Embedded Systems
Software has become strategic to developing effective distributed real-time and embedded (DRE) systems. Next-generation DRE systems, such as total ship computing environments, coo...
Douglas C. Schmidt
EMSOFT
2006
Springer
14 years 2 months ago
Time-triggered implementations of dynamic controllers
Bridging the gap between model-based design and platformbased implementation is one of the critical challenges for embedded software systems. In the context of embedded control sy...
Truong Nghiem, George J. Pappas, Rajeev Alur, Anto...
« Prev « First page 1461 / 1701 Last » Next »