Sciweavers

852 search results - page 135 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
SPE
2008
89views more  SPE 2008»
15 years 4 months ago
The Runabout
This paper presents a variation of the visitor pattern which allows programmers to write visitor-like code in a concise way. The Runabout is a library extension that adds a limited...
Christian Grothoff
ICFCA
2004
Springer
15 years 9 months ago
BLID: An Application of Logical Information Systems to Bioinformatics
BLID (Bio-Logical Intelligent Database) is a bioinformatic system designed to help biologists extract new knowledge from raw genome data by providing high-level facilities for both...
Sébastien Ferré, Ross D. King
IFIP
2004
Springer
15 years 9 months ago
Behavioural Equivalences for Dynamic Web Data
Peer-to-peer systems, exchanging dynamic documents through Web services, are a simple and effective platform for data integration on the internet. Dynamic documents can contain b...
Sergio Maffeis, Philippa Gardner
FAST
2010
15 years 6 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
EMSOFT
2004
Springer
15 years 9 months ago
Loose synchronization of event-triggered networks for distribution of synchronous programs
Dataflow synchronous languages have attracted considerable interest in domains such as real-time control and hardware design. The potential benefits are promising: Discrete-time...
Jan Romberg, Andreas Bauer 0002