Sciweavers

4764 search results - page 424 / 953
» Applications of Error-Control Coding
Sort
View
135
Voted
SOFSEM
2005
Springer
15 years 9 months ago
Tier Aspect Model Based on Updatable Views
The tier aspect model addresses Aspect Oriented Programming (AOP) in the context of database applications. It is a new technique of separation of concerns through tiers implemented...
Radoslaw Adamus, Kazimierz Subieta
123
Voted
ATAL
2004
Springer
15 years 9 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
121
Voted
ISCIS
2004
Springer
15 years 9 months ago
Mutation-Like Oriented Diversity for Dependability Improvement: A Distributed System Case Study
Abstract. Achieving higher levels of dependability is a goal in any software project, therefore strategies for software reliability improvement are very attractive. This work intro...
Daniel O. Bortolas, Avelino F. Zorzo, Eduardo A. B...
ISCAS
2003
IEEE
147views Hardware» more  ISCAS 2003»
15 years 9 months ago
Parameterized and low power DSP core for embedded systems
Conventional ASIC designs are hard to be customized. Therefore DSP core-based ASIC design has potentially large payoff. This approach not only supports improved performance but al...
Ya-Lan Tsao, Ming Hsuan Tan, Jun-Xian Teng, Shyh-J...
134
Voted
WCRE
2003
IEEE
15 years 9 months ago
Completeness of a Fact Extractor
The process of software reverse engineering commonly uses an extractor, which parses source code and extracts facts about the code. The level of detail in these facts varies from ...
Yuan Lin, Richard C. Holt, Andrew J. Malton