Sciweavers

852 search results - page 88 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
VISUAL
1999
Springer
15 years 8 months ago
Visual Presentations in Multimedia Learning: Conditions that Overload Visual Working Memory
How should we design visual presentations to explain how a complex system works? One promising approach involves multimedia presentation of explanations in visual and verbal format...
Roxana Moreno, Richard E. Mayer
PDP
2011
IEEE
14 years 8 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...
EJWCN
2010
149views more  EJWCN 2010»
14 years 11 months ago
Collaborative Event-Driven Coverage and Rate Allocation for Event Miss-Ratio Assurances in Wireless Sensor Networks
Wireless sensor networks are often required to provide event miss-ratio assurance for a given event type. To meet such assurances along with minimum energy consumption, this paper ...
Hidayet Ozgur Sanli, Hasan Çam
WSE
2005
IEEE
15 years 10 months ago
Crosscutting Concerns in J2EE Applications
We explore the evolution benefits of adopting aspects in a J2EE setting by studying crosscutting concerns in a typical J2EE application. To identify these concerns, we take a top...
Ali Mesbah, Arie van Deursen
KBSE
1997
IEEE
15 years 8 months ago
Precise Specification and Automatic Application of Design Patterns
Despite vast interest in design patterns, the specification and application of patterns is generally assumed to rely on manual implementation. We describe a precise method of spec...
Amnon H. Eden, Amiram Yehudai, Joseph Gil