Sciweavers

44 search results - page 5 / 9
» A degree-of-knowledge model to capture source code familiari...
Sort
View
CODES
2001
IEEE
15 years 3 months ago
A constraint-based application model and scheduling techniques for power-aware systems
New embedded systems must be power-aware, not just low-power. That is, they must track their power sources and the changingpower and performance constraints imposed by the environ...
Jinfeng Liu, Pai H. Chou, Nader Bagherzadeh, Fadi ...
WCRE
2006
IEEE
15 years 5 months ago
How Programs Represent Reality (and how they don't)
Programming is modeling the reality. Most of the times, the mapping between source code and the real world concepts is captured implicitly in the names of identifiers. Making the...
Daniel Ratiu, Florian Deissenboeck
OTM
2009
Springer
15 years 6 months ago
The Constellation Query Language
Collaboration in modeling is essential to success, but ORM diagrams intimidate many business people, and most would never install an ORM modeling tool on their computers. The Const...
Clifford Heath
TACAS
2010
Springer
221views Algorithms» more  TACAS 2010»
15 years 6 months ago
Trace-Based Symbolic Analysis for Atomicity Violations
Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
GLOBECOM
2007
IEEE
15 years 6 months ago
Two-Hop Two-Path Voice Communications Over a Mobile Ad-Hoc Network
Abstract— We consider two-hop communication of a delaysensitive, memoryless Gaussian source over two independent paths in an ad-hoc network. To capture the behavior an ad-hoc net...
Jagadeesh Balam, Jerry D. Gibson