Sciweavers

2259 search results - page 139 / 452
» Separation and information hiding
Sort
View
HPCA
2002
IEEE
14 years 10 months ago
Quantifying Load Stream Behavior
The increasing performance gap between processors and memory will force future architectures to devote significant resources towards removing and hiding memory latency. The two ma...
Suleyman Sair, Timothy Sherwood, Brad Calder
SAC
2010
ACM
14 years 5 months ago
Design pattern implementation in object teams
Implementing the 23 Gang-of-Four design patterns in the aspectoriented programming language Object Teams/Java (OT/J) yields modularity and reusability results roughly comparable t...
João L. Gomes, Miguel P. Monteiro
SC
2009
ACM
14 years 5 months ago
Using dynamic accounts to enable access to advanced resources through science gateways
Science Gateways have emerged as a valuable solution for providing large numbers of users with access to advanced computing resources. Additionally, they can hide many of the comp...
Joseph A. Insley, Ti Leggett, Michael E. Papka
GLOBECOM
2009
IEEE
14 years 4 months ago
Human Behavior and Challenges of Anonymizing WLAN Traces
—With the wide spread deployment of wireless LANs (WLANs), it is becoming necessary to conduct analysis of libraries of measurements taken from such operational networks. The ava...
Udayan Kumar, Ahmed Helmy
MODELS
2009
Springer
14 years 4 months ago
Catch Me If You Can - Debugging Support for Model Transformations
Abstract. Model-Driven Engineering places models as first-class artifacts throughout the software lifecycle requiring the availability of proper transformation languages. Although...
Johannes Schönböck, Gerti Kappel, Angeli...