Sciweavers

1448 search results - page 3 / 290
» From Requirements to Code Revisited
Sort
View
JOT
2007
104views more  JOT 2007»
13 years 5 months ago
Common Requirements Problems, Their Negative Consequences, and the Industry Best Practices to Help Solve Them
In this column, I summarize the 12 worst of the most common requirements engineering problems I have observed over many years working on and with real projects as a requirements e...
Donald Firesmith
PAAPP
2006
44views more  PAAPP 2006»
13 years 5 months ago
Revisiting communication code generation algorithms for message-passing systems
In this paper, we investigate algorithms for generating communication code to run on distributedmemory systems. We modify algorithms from previously published work and prove that ...
Clayton S. Ferner
CORR
2011
Springer
243views Education» more  CORR 2011»
13 years 23 days ago
Deterministic Network Model Revisited: An Algebraic Network Coding Approach
Abstract—The capacity of multiuser networks has been a longstanding problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to appr...
MinJi Kim, Elona Erez, Edmund M. Yeh, Muriel M&eac...
JSAC
2007
97views more  JSAC 2007»
13 years 5 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
ICSEA
2008
IEEE
14 years 5 days ago
Reuse through Requirements Traceability
The Reuse of code artefacts can make development quicker, cheaper and more robust, but the process is complex and has many pitfalls: Code artefacts must exist, be available, be fo...
Rob Pooley, Craig Warren