Sciweavers

694 search results - page 127 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
88
Voted
IPSN
2007
Springer
15 years 5 months ago
Energy-optimized image communication on resource-constrained sensor platforms
Energy-efficient image communication is one of the most important goals for a large class of current and future sensor network applications. This paper presents a quantitative com...
Dong-U Lee, Hyungjin Kim, Steven Tu, Mohammad H. R...
79
Voted
NETGAMES
2006
ACM
15 years 5 months ago
Plug-replaceable consistency maintenance for multiplayer games
Consistency maintenance of replicated data in multiplayer games is a challenging issue due to the performance constraints of real-time interactive applications. We present an appr...
Robert D. S. Fletcher, T. C. Nicholas Graham, Chri...
ICFEM
2004
Springer
15 years 5 months ago
Memory-Model-Sensitive Data Race Analysis
Abstract. We present a “memory-model-sensitive” approach to validating correctness properties for multithreaded programs. Our key insight is that by specifying both the inter-t...
Yue Yang, Ganesh Gopalakrishnan, Gary Lindstrom
102
Voted
TAMODIA
2007
15 years 25 days ago
Exploring Usability Needs by Human-Computer Interaction Patterns
Abstract. Covering quality aspects such as usability through the software development life cycle is challenging. These “-ilities” are generally difficult to grasp and usually ...
Markus Specker, Ina Wentzlaff
93
Voted
VSTTE
2005
Springer
15 years 5 months ago
Verifying Design with Proof Scores
: Verifying design instead of code can be an effective and practical approach to obtaining verified software. This paper argues that proof scores are an attractive method for ver...
Kokichi Futatsugi, Joseph A. Goguen, Kazuhiro Ogat...