Sciweavers

1412 search results - page 200 / 283
» The Value of Outsourced Software
Sort
View
LADC
2007
Springer
14 years 4 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
ASPLOS
2006
ACM
14 years 4 months ago
Supporting nested transactional memory in logTM
Nested transactional memory (TM) facilitates software composition by letting one module invoke another without either knowing whether the other uses transactions. Closed nested tr...
Michelle J. Moravan, Jayaram Bobba, Kevin E. Moore...
IUI
2005
ACM
14 years 3 months ago
Improving proactive information systems
Proactive contextual information systems help people locate information by automatically suggesting potentially relevant resources based on their current tasks or interests. Such ...
Daniel Billsus, David M. Hilbert, Dan Maynes-Aminz...
AFP
2004
Springer
105views Formal Methods» more  AFP 2004»
14 years 3 months ago
Epigram: Practical Programming with Dependent Types
Abstraction and application, tupling and projection: these provide the ‘software engineering’ superstructure for programs, and our familiar type systems ensure that these opera...
Conor McBride
FDL
2003
IEEE
14 years 3 months ago
Object-Oriented ASIP Design and Synthesis
SystemC-Plus from the ODETTE project provides the ability to simulate and synthesise object-oriented specifications into hardware. The current ODETTE compiler translates each obj...
Maziar Goudarzi, Shaahin Hessabi, Alan Mycroft