Sciweavers

2746 search results - page 499 / 550
» Case Study in Survivable Network System Analysis
Sort
View
IJEB
2007
127views more  IJEB 2007»
15 years 1 months ago
Factors mediating the routinisation of e-learning within a traditional university education environment
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) ...
Shafqat Hameed, John Mellor, Atta Badii, Niyati Pa...
JSC
2010
106views more  JSC 2010»
14 years 12 months ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...
TSE
2010
125views more  TSE 2010»
14 years 11 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin
XPU
2010
Springer
14 years 11 months ago
Extreme Product Line Engineering - Refactoring for Variability: A Test-Driven Approach
Software product lines - families of similar but not identical software products - need to address the issue of feature variability. That is, a single feature might require various...
Yaser Ghanam, Frank Maurer
ERSA
2010
119views Hardware» more  ERSA 2010»
14 years 11 months ago
Performance Visualization and Exploration for Reconfigurable Computing Applications
Reconfigurable computing (RC) applications have the potential for significant performance while consuming little power. Although runtime performance analysis of RC applications has...
Seth Koehler, Alan D. George