Sciweavers

12333 search results - page 2265 / 2467
» System Level Modelling for Hardware Software Systems
Sort
View
115
Voted
ICSE
2008
IEEE-ACM
16 years 2 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
114
Voted
LCTRTS
2009
Springer
15 years 9 months ago
Push-assisted migration of real-time tasks in multi-core processors
Multicores are becoming ubiquitous, not only in general-purpose but also embedded computing. This trend is a reflexion of contemporary embedded applications posing steadily incre...
Abhik Sarkar, Frank Mueller, Harini Ramaprasad, Si...
LCPC
2005
Springer
15 years 8 months ago
Supporting SELL for High-Performance Computing
We briefly introduce the notion of Semantically Enhanced Library Languages, SELL, as a practical and economical alternative to special-purpose programming languages for high-perfo...
Bjarne Stroustrup, Gabriel Dos Reis
112
Voted
AVI
2008
15 years 4 months ago
SyncDecor: communication appliances for virtual cohabitation
Despite the fact that various means of communication such as mobile phones, instant messenger and e-mail are now widespread; many romantic couples separated by long distances worr...
Hitomi Tsujita, Koji Tsukada, Itiro Siio
148
Voted
IJWIS
2006
91views more  IJWIS 2006»
15 years 2 months ago
Handheld Computing and Programming for Mobile Commerce
: Using Internet-enabled mobile handheld devices to access the World Wide Web is a promising addition to the Web and traditional e-commerce. Mobile handheld devices provide conveni...
Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, Hung-Jen Yang
« Prev « First page 2265 / 2467 Last » Next »