Sciweavers

9316 search results - page 101 / 1864
» Analysis of traceback techniques
Sort
View
CBSE
2005
Springer
15 years 7 months ago
Finding a Needle in the Haystack: A Technique for Ranking Matches Between Components
Abstract. Searching and subsequently selecting reusable components from component repositories has become a key impediment for not only component-based development but also for ach...
Naiyana Tansalarak, Kajal T. Claypool
ICNP
1998
IEEE
15 years 5 months ago
A Proof Technique for Liveness Properties of Multifunction Composite Protocols
In protocol composition techniques, component protocols are combined in various ways to obtain a complex protocol whose execution sequences consist of interleaved execution sequen...
J. Park, R. Miller
ISARCS
2010
141views Hardware» more  ISARCS 2010»
15 years 5 months ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
VISUALIZATION
1995
IEEE
15 years 5 months ago
Recursive Pattern: A Technique for Visualizing Very Large Amounts of Data
Animportantgoalofvisualizationtechnologyistosupport the exploration and analysis of very large amounts of data. In this paper, we propose a new visualization technique called ‘r...
Daniel A. Keim, Mihael Ankerst, Hans-Peter Kriegel
ICCAD
2006
IEEE
180views Hardware» more  ICCAD 2006»
15 years 10 months ago
A bitmask-based code compression technique for embedded systems
Embedded systems are constrained by the available memory. Code compression techniques address this issue by reducing the code size of application programs. Dictionary-based code c...
Seok-Won Seong, Prabhat Mishra