Sciweavers

302 search results - page 13 / 61
» An approach to synthesise safe systems
Sort
View
128
Voted
ECEASST
2010
14 years 9 months ago
Safe Integration of Annotated Components in Open Source Projects
: The decision of using existing software components versus building from scratch custom software is one of the most complex and important choices of the entire development/integra...
Sergio Areias, Daniela Carneiro da Cruz, Pedro Ran...
83
Voted
VLSID
2005
IEEE
129views VLSI» more  VLSID 2005»
16 years 23 days ago
A RISC Hardware Platform for Low Power Java
Java is increasingly being used as a language and binary format for low power, embedded systems. Current software only approaches to Java execution do not always suit the type of ...
Paul Capewell, Ian Watson
96
Voted
VL
2003
IEEE
121views Visual Languages» more  VL 2003»
15 years 5 months ago
Visual methods for web application design
The paper outlines a tool-supported approach to the design of Web applications. Behavioural models are augmented with web-based simulations of user interfaces to permit validation...
Robert Chatley, Jeff Kramer, Jeff Magee, Sebasti&a...
VLDB
2012
ACM
360views Database» more  VLDB 2012»
13 years 8 months ago
An adaptive updating protocol for reducing moving object database workload
In the last decade, spatio-temporal database research focuses on the design of effective and efficient indexing structures in support of location-based queries such as predictive...
Su Chen, Beng Chin Ooi, Zhenjie Zhang
ASP
2001
Springer
15 years 4 months ago
Answer Set Programming and Bounded Model Checking
In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. This is an extension of earlier w...
Keijo Heljanko, Ilkka Niemelä