Sciweavers

5843 search results - page 1056 / 1169
» Software Security in Practice
Sort
View
CORR
2006
Springer
160views Education» more  CORR 2006»
13 years 10 months ago
On Conditional Branches in Optimal Search Trees
A commonly used type of search tree is the alphabetic binary tree, which uses (without loss of generality) "less than" versus "greater than or equal to" tests ...
Michael B. Baer
IJHPCA
2008
75views more  IJHPCA 2008»
13 years 10 months ago
Towards Ultra-High Resolution Models of Climate and Weather
We present a speculative extrapolation of the performance aspects of an atmospheric general circulation model to ultra-high resolution and describe alternative technological paths...
Michael F. Wehner, Leonid Oliker, John Shalf
GRID
2006
Springer
13 years 10 months ago
Monitoring and analysing a Grid Middleware Node
Distributed Grid applications are becoming more and more popular as the use of complex grid middlewares becomes extensive, and more facilities are offered by these complex pieces o...
Ramon Nou, Ferran Julià, David Carrera, Kev...
INFSOF
2006
66views more  INFSOF 2006»
13 years 10 months ago
Scenario-based multitasking for real-time object-oriented models
Contemporary embedded systems quite often employ extremely complicated software consisting of a number of interrelated components, and this has made object-oriented design methodo...
Saehwa Kim, Jiyong Park, Seongsoo Hong
ENTCS
2007
171views more  ENTCS 2007»
13 years 10 months ago
A Certifying Code Generation Phase
Guaranteeing correctness of compilation is a vital precondition for correct software. Code generation can be one of the most error-prone tasks in a compiler. One way to achieve tr...
Jan Olaf Blech, Arnd Poetzsch-Heffter
« Prev « First page 1056 / 1169 Last » Next »