Sciweavers

847 search results - page 157 / 170
» A comparison of common programming languages used in bioinfo...
Sort
View
DAC
2005
ACM
15 years 10 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
UIC
2009
Springer
15 years 4 months ago
Printing in Ubiquitous Computing Environments
Document printing has long been considered an indispensable part of the workspace. While this process is considered trivial and simple for environments where resources are ample (e...
Athanasios Karapantelakis, Alisa Devlic, Mohammad ...
ICAC
2005
IEEE
15 years 3 months ago
Myrrh: A Transaction-Based Model for Autonomic Recovery
As software comes under increasing scrutiny for its lack of safety and reliability, numerous static and partially dynamic tools (including model checking) have been proposed for v...
Guy Eddon, Steven P. Reiss
B
2007
Springer
15 years 1 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
COMPUTER
2006
98views more  COMPUTER 2006»
14 years 9 months ago
Componentization: The Visitor Example
: In software design, laziness is a virtue: it's better to reuse than to redo. Design patterns are a good illustration. Patterns, a major advance in software architecture, pro...
Bertrand Meyer, Karine Arnout