Sciweavers

1412 search results - page 154 / 283
» The Value of Outsourced Software
Sort
View
WCRE
2008
IEEE
15 years 10 months ago
Automated Concept Location Using Independent Component Analysis
Concept location techniques are designed to help isolate sections of source code that relate to specific concepts. Blind Signal Separation techniques like Singular Value Decompos...
Scott Grant, James R. Cordy, David B. Skillicorn
OOPSLA
2007
Springer
15 years 10 months ago
Supporting systems QoS design and evolution through model transformations
We describe Quality of service pICKER (QUICKER), a model-driven QoS mapping toolchain for supporting the QoS design and evolution of systems software. QUICKER automates the mappin...
Amogh Kavimandan, Aniruddha S. Gokhale
FCCM
2006
IEEE
106views VLSI» more  FCCM 2006»
15 years 10 months ago
Scalable Hardware Architecture for Real-Time Dynamic Programming Applications
Abstract— This paper introduces a novel architecture for performing the core computations required by dynamic programming (DP) techniques. The latter pertain to a vast range of a...
Brad Matthews, Itamar Elhanany
ML
2006
ACM
122views Machine Learning» more  ML 2006»
15 years 10 months ago
Type-safe modular hash-consing
Hash-consing is a technique to share values that are structurally equal. Beyond the obvious advantage of saving memory blocks, hash-consing may also be used to speed up fundamenta...
Jean-Christophe Filliâtre, Sylvain Conchon
SACMAT
2006
ACM
15 years 10 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen