Sciweavers

SAC
2006
ACM
14 years 2 months ago
Event-driven scheduling for dynamic workload scaling in uniprocessor embedded systems
Many embedded systems are designed to take timely reactions to the occurrences of interested scenarios. Sometimes transient overloads might be experienced due to hardware malfunct...
Li-Pin Chang
SAC
2006
ACM
14 years 2 months ago
Towards a model-driven join point model
Aspect–Oriented Programming (AOP) is increasingly being adopted by developers to better modularize object–oriented design by introducing crosscutting concerns. However, due to...
Walter Cazzola, Antonio Cicchetti, Alfonso Pierant...
SAC
2006
ACM
14 years 2 months ago
An implicit segmentation-based method for recognition of handwritten strings of characters
This paper describes an implicit segmentation-based method for recognition of strings of characters (words or numerals). In a two-stage HMM-based method, an implicit segmentation ...
Paulo Rodrigo Cavalin, Alceu de Souza Britto Jr., ...
SAC
2006
ACM
14 years 2 months ago
A chat interface for human-agent interaction in MAST
In this paper we introduce a group-messaging interface that allows humans to efficiently interact with a group of agents through a hierarchical and customizable text protocol. Our...
Marco M. Carvalho, Matteo Rebeschini, James Horsle...
SAC
2006
ACM
14 years 2 months ago
Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcasts
We solve the consensus problem using a new class of broadcasts that are very appropriate to ad-hoc networking: every broadcast message is eventually ensured to be garbagecollected...
François Bonnet, Paul D. Ezhilchelvan, Eina...
SAC
2006
ACM
14 years 2 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
SAC
2006
ACM
14 years 2 months ago
Java bytecode specification and verification
Lilian Burdy, Mariela Pavlova
SAC
2006
ACM
14 years 2 months ago
Provably faithful evaluation of polynomials
We provide sufficient conditions that formally guarantee that the floating-point computation of a polynomial evaluation is faithful. To this end, we develop a formalization of ...
Sylvie Boldo, César Muñoz
SAC
2006
ACM
14 years 2 months ago
MACE: lossless compression and analysis of microarray images
Robert Bierman, Nidhi Maniyar, Charles Parsons, Ra...
SAC
2006
ACM
14 years 2 months ago
Adapting software components by structure fragmentation
We present in this paper an approach aiming at adapting software components. It focuses on adapting component structures instead of adapting component services. Among the motivati...
Gautier Bastide, Abdelhak Seriai, Mourad Oussalah