Sciweavers

34 search results - page 7 / 7
» Change Impact Graphs: Determining the Impact of Prior Code C...
Sort
View
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 4 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
CODES
2007
IEEE
13 years 11 months ago
Event-based re-training of statistical contention models for heterogeneous multiprocessors
Embedded single-chip heterogeneous multiprocessor (SCHM) systems experience frequent system events such as task preemption, power-saving voltage/frequency scaling, or arrival of n...
Alex Bobrek, JoAnn M. Paul, Donald E. Thomas
AOSD
2008
ACM
13 years 7 months ago
AJANA: a general framework for source-code-level interprocedural dataflow analysis of AspectJ software
Aspect-oriented software presents new challenges for the designers of static analyses. Our work aims to establish systematic foundations for dataflow analysis of AspectJ software....
Guoqing Xu, Atanas Rountev
JVCIR
2007
140views more  JVCIR 2007»
13 years 4 months ago
Robust video streaming over wireless LANs using multiple description transcoding and prioritized retransmission
Video transport over wireless Local Area Networks (LANs) usually suffers from signal fading, noise interference, and network congestion, leading to time-varying packet loss rate ...
Chih-Ming Chen, Chia-Wen Lin, Hsiao-Cheng Wei, Yun...