Sciweavers

8623 search results - page 1545 / 1725
» Software engineering for secure systems
Sort
View
ICSE
2012
IEEE-ACM
12 years 1 days ago
Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports
—For a large and evolving software system, the project team could receive a large number of bug reports. Locating the source code files that need to be changed in order to fix th...
Jian Zhou, Hongyu Zhang, David Lo
SENSYS
2006
ACM
14 years 3 months ago
The tenet architecture for tiered sensor networks
Most sensor network research and software design has been guided by an architectural principle that permits multi-node data fusion on small-form-factor, resource-poor nodes, or mo...
Omprakash Gnawali, Ki-Young Jang, Jeongyeup Paek, ...
CBSE
2004
Springer
14 years 3 months ago
Extra-Functional Contract Support in Components
According to Szyperski, “a software component is a unit of composition with contractually specified interfaces and explicit context dependencies only”. But it is well known tha...
Olivier Defour, Jean-Marc Jézéquel, ...
WWW
2001
ACM
14 years 10 months ago
ViBE: virtual biology experiments
The virtual laboratories enhance learning experiences by providing the student with a supplement to the physical lab. The laboratories allow students to perform exercises as in an...
Rajaram Subramanian, Ivan Marsic
ARCS
2009
Springer
14 years 4 months ago
Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture
The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software c...
Joseph Gebis, Leonid Oliker, John Shalf, Samuel Wi...
« Prev « First page 1545 / 1725 Last » Next »