Sciweavers

8623 search results - page 1534 / 1725
» Software engineering for secure systems
Sort
View
CGO
2007
IEEE
14 years 1 months ago
Shadow Profiling: Hiding Instrumentation Costs with Parallelism
In profiling, a tradeoff exists between information and overhead. For example, hardware-sampling profilers incur negligible overhead, but the information they collect is consequen...
Tipp Moseley, Alex Shye, Vijay Janapa Reddi, Dirk ...
FASE
2007
Springer
14 years 1 months ago
A Family of Distributed Deadlock Avoidance Protocols and Their Reachable State Spaces
Abstract. We study resource management in distributed systems. Incorrect handling of resources may lead to deadlocks, missed deadlines, priority inversions, and other forms of inco...
César Sánchez, Henny B. Sipma, Zohar...
APSEC
2004
IEEE
14 years 1 months ago
A Dual-Mode Exerciser for a Collaborative Computing Environment
Computer-supported cooperative work (CSCW) supports groups with communication and coordination during the execution of their activities. It allows physically dispersed teams to en...
Chien-Min Wang, Shyh-Fong Hong, Shun-Te Wang, Hsi-...
AUIC
2004
IEEE
14 years 1 months ago
Rapid Visual Flow: How Fast Is Too Fast?
It is becoming increasingly common for user interfaces to use zooming visual effects that automatically adapt to user actions. The MacOs X `dock' icon panel, for instance, us...
Andrew Wallace, Joshua Savage, Andy Cockburn
EMSOFT
2006
Springer
14 years 1 months ago
New approach to architectural synthesis: incorporating QoS constraint
Embedded applications like video decoding, video streaming and those in the network domain, typically have a Quality of Service (QoS) requirement which needs to be met. Apart from...
Harsh Dhand, Basant Kumar Dwivedi, M. Balakrishnan
« Prev « First page 1534 / 1725 Last » Next »