Sciweavers

686 search results - page 66 / 138
» Behavior Protocols for Software Components
Sort
View
IASTEDSEA
2004
15 years 1 months ago
Insecurity by contract
Design by Contract is a design methodology that promotes software reliability and reusability by requiring each component module to have a well-specified interface and leaves a mo...
Phillip L. Nico, Clark Savage Turner, Kimberly Kno...
ICNS
2009
IEEE
15 years 6 months ago
Proactive Future Internet: Smart Semantic Middleware for Overlay Architecture
Some initiatives towards Future Internet, e.g., GENI, DARPA’s Active Networks, argue the need for programmability of the network components. Some other initiatives extend this w...
Vagan Y. Terziyan, Dmytro Zhovtobryukh, Artem Kata...
OOPSLA
2007
Springer
15 years 6 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
ECLIPSE
2007
ACM
15 years 3 months ago
Porting a distributed meeting system to the Eclipse communication framework
eConference is a text-based conferencing tool that supports distributed teams in need for synchronous communication and structured discussion services. Other than offering communi...
Fabio Calefato, Filippo Lanubile, Mario Scalas
TC
2011
14 years 6 months ago
Software-Based Cache Coherence with Hardware-Assisted Selective Self-Invalidations Using Bloom Filters
— Implementing shared memory consistency models on top of hardware caches gives rise to the well-known cache coherence problem. The standard solution involves implementing cohere...
Thomas J. Ashby, Pedro Diaz, Marcelo Cintra