Sciweavers

45 search results - page 8 / 9
» Software and Services: Where do they meet
Sort
View
ICSE
2000
IEEE-ACM
13 years 9 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
VRST
1999
ACM
13 years 10 months ago
The London Travel Demonstrator
Travel can be a stressful experience and it is an activity that is difficult to prepare for in advance. Although maps, routes and landmarks can be memorised, travellers do not get...
Anthony Steed, Emmanuel Frécon, Anneli Avat...
RTSS
2009
IEEE
14 years 14 days ago
Timing Analysis of Concurrent Programs Running on Shared Cache Multi-Cores
—Memory accesses form an important source of timing unpredictability. Timing analysis of real-time embedded software thus requires bounding the time for memory accesses. Multipro...
Yan Li, Vivy Suhendra, Yun Liang, Tulika Mitra, Ab...
ICPP
1999
IEEE
13 years 10 months ago
Multi-Capacity Bin Packing Algorithms with Applications to Job Scheduling under Multiple Constraints
In past massively parallel processing systems, such as the TMC CM-5 and the CRI T3E, the scheduling problem consisted of allocating a single type of resource among the waiting job...
William Leinberger, George Karypis, Vipin Kumar
COMSWARE
2008
IEEE
14 years 6 days ago
Call admission control: QoS issue for VoIP
—One of the vital key elements for providing Quality of Service (QoS) for VoIP is the Call Admission Control (CAC) capabilities of the Session Management /Call Session Control Fu...
Mohammad Asadul Hoque, Farhana Afroz