Sciweavers

2159 search results - page 364 / 432
» C-K design theory for information systems research
Sort
View
CODES
2006
IEEE
15 years 4 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
SIGCOMM
2004
ACM
15 years 7 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown
PLDI
2003
ACM
15 years 7 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
PETRA
2010
ACM
15 years 11 days ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
BIRTHDAY
2009
Springer
15 years 8 months ago
Web Service Composition via the Customization of Golog Programs with User Preferences
Abstract. We claim that user preferences are a key component of effective Web service composition, and one that has largely been ignored. In this paper we propose a means of speci...
Shirin Sohrabi, Nataliya Prokoshyna, Sheila A. McI...