Sciweavers

2245 search results - page 189 / 449
» A Case Study Implementing Features Using AspectJ
Sort
View
IPPS
2006
IEEE
15 years 11 months ago
Parallel calculation of volcanoes for cryptographic uses
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Nevertheless, since not every elliptic curve is useful for cryptographic purposes, me...
Santi Martínez, R. Tomas, C. Roig, Magda Va...
ISCAPDCS
2003
15 years 6 months ago
Using Kernel Coupling to Improve the Performance of Multithreaded Applications
Kernel coupling refers to the effect that kernel i has on kernel j in relation to running each kernel in isolation. The two kernels can correspond to adjacent kernels or a chain ...
Jonathan Geisler, Valerie E. Taylor, Xingfu Wu, Ri...
IJMMS
2007
142views more  IJMMS 2007»
15 years 5 months ago
Using OWL to model biological knowledge
Much has been written of the facilities for ontology building and reasoning offered for ontologies expressed in the Web Ontology Language (OWL). Less has been written about how th...
Robert Stevens, Mikel Egaña Aranguren, Katy...
PADL
2009
Springer
16 years 5 months ago
Declarative Network Verification
Abstract. In this paper, we present our initial design and implementation of a declarative network verifier (DNV). DNV utilizes theorem proving, a well established verification tec...
Anduo Wang, Prithwish Basu, Boon Thau Loo, Oleg So...
JSS
2007
169views more  JSS 2007»
15 years 5 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton