Sciweavers

4923 search results - page 872 / 985
» Software Risk Management
Sort
View
CIDR
2009
133views Algorithms» more  CIDR 2009»
13 years 10 months ago
Principles for Inconsistency
Data consistency is very desirable because strong semantic properties make it easier to write correct programs that perform as users expect. However, there are good reasons why co...
Shel Finkelstein, Dean Jacobs, Rainer Brendle
CLEF
2009
Springer
13 years 10 months ago
Robust Question Answering for Speech Transcripts: UPC Experience in QAst 2009
This paper describes the participation of the Technical University of Catalonia in the CLEF 2009 Question Answering on Speech Transcripts track. We have participated in the Englis...
Pere Comas, Jordi Turmo
JTRES
2010
ACM
13 years 9 months ago
Developing safety critical Java applications with oSCJ/L0
We present oSCJ, an implementation of the draft of Safety Critical Java (SCJ) specification. SCJ is designed to make Java amenable to writing mission- and safety-critical software...
Ales Plsek, Lei Zhao, Veysel H. Sahin, Daniel Tang...
SIGCOMM
2010
ACM
13 years 9 months ago
Towards software-friendly networks
There has usually been a clean separation between networks and the applications that use them. Applications send packets over a simple socket API; the network delivers them. Howev...
Kok-Kiong Yap, Te-Yuan Huang, Ben Dodson, Monica S...
ICDCSW
2007
IEEE
13 years 9 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...