Sciweavers

2947 search results - page 442 / 590
» Analyzing Program Analyses
Sort
View
INFOSCALE
2006
ACM
15 years 5 months ago
A dynamic mechanism for handling mobile computing environmental changes
--Nowadays, the issue of the energy saving on the mobile client is becoming more and more concerned. Among those power conservation techniques, computation offloading schemes are b...
MingJian Tang, Jinli Cao
IPPS
2005
IEEE
15 years 5 months ago
Automatic Construction and Evaluation of Performance Skeletons
The performance skeleton of an application is a short running program whose execution time in any scenario reflects the estimated execution time of the application it represents....
Sukhdeep Sodhi, Jaspal Subhlok
WCRE
2005
IEEE
15 years 5 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
IHIS
2005
ACM
15 years 5 months ago
Verifying web services composition based on hierarchical colored petri nets
Current Web services composition proposals, such as BPML, BPEL, WSCI, and OWL-S, provide notations for describing the control and data flows in Web service collaborations. However...
Yanping Yang, QingPing Tan, Yong Xiao
ITICSE
2005
ACM
15 years 5 months ago
Implications of perspective in teaching objects first and object design
There are an increasing number of books published on the important topics of “object-oriented programming” and “object-oriented design” for use in education. However, obje...
Henrik Bærbak Christensen