Sciweavers

1821 search results - page 282 / 365
» Security-Aware Program Transformations
Sort
View
AGILEDC
2004
IEEE
14 years 22 days ago
Behind the Rules: XP Experiences
Agile processes such as XP (eXtreme Programming) have been recognised for their potential benefits of improving software. During adoption of the XP process, teams can misapply the...
Andrew Jackson, Shiu Lun Tsang, Alan Gray, Cormac ...
CC
2004
Springer
114views System Software» more  CC 2004»
14 years 21 days ago
Integrating the Soot Compiler Infrastructure into an IDE
This paper presents the integration of Soot, a byte-code analysis and transformation framework, with an integrated development environment (IDE), Eclipse. Such an integrated toolki...
Jennifer Lhoták, Ondrej Lhoták, Laur...
AICCSA
2001
IEEE
131views Hardware» more  AICCSA 2001»
14 years 19 days ago
Constraint-Based Timetabling-A Case Study
This paper2 details the stages of building a substantial, carefully specified, fully tested and fully operational university and school timetabling system. This is reported as a c...
Abdulwahed M. Abbas, Edward P. K. Tsang
DBPL
1995
Springer
144views Database» more  DBPL 1995»
14 years 16 days ago
An Algebraic Framework for Physical OODB Design
Physical design for object-oriented databases is still in its infancy. Implementation decisions often intrude into the conceptual design (such as inverse links and object decompos...
Leonidas Fegaras, David Maier
FPGA
1995
ACM
120views FPGA» more  FPGA 1995»
14 years 16 days ago
Synthesis of Signal Processing Structured Datapaths for FPGAs Supporting RAMs and Busses
A novel approach is presented for transforming a given scheduled and bound signal processing algorithm for a multiplexer based datapath to a BUS/RAM based FPGA datapath. A datapat...
Baher Haroun, Behzad Sajjadi