Sciweavers

661 search results - page 99 / 133
» What Can We Expect from Program Verification
Sort
View
TOOLS
2008
IEEE
14 years 1 months ago
Controlling Accessibility in Agile Projects with the Access Modifier Modifier
Access modifiers like public and private let the programmer control the accessibility of class members. Restricted accessibility supports encapsulation, i.e., the hiding of impleme...
Philipp Bouillon, Eric Großkinsky, Friedrich...
CORR
2006
Springer
81views Education» more  CORR 2006»
13 years 7 months ago
Modeling Aspect Mechanisms: A Top-Down Approach
A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a char...
Sergei Kojarski, David H. Lorenz
CLUSTER
2011
IEEE
12 years 7 months ago
A Framework for Data-Intensive Computing with Cloud Bursting
—For many organizations, one attractive use of cloud resources can be through what is referred to as cloud bursting or the hybrid cloud. These refer to scenarios where an organiz...
Tekin Bicer, David Chiu, Gagan Agrawal
CVIU
2008
109views more  CVIU 2008»
13 years 7 months ago
Performance vs computational efficiency for optimizing single and dynamic MRFs: Setting the state of the art with primal-dual st
In this paper we introduce a novel method to address minimization of static and dynamic MRFs. Our approach is based on principles from linear programming and, in particular, on pr...
Nikos Komodakis, Georgios Tziritas, Nikos Paragios
FPCA
1989
13 years 11 months ago
A Simple Semantics for ML Polymorphism
We give a framework for denotational semantics for the polymorphic “core” of the programming language ML. This framework requires no more semantic material than what is needed...
Atsushi Ohori