Sciweavers

1240 search results - page 26 / 248
» Composition with Target Constraints
Sort
View
SIGSOFT
2009
ACM
15 years 10 months ago
Fitting the pieces together: a machine-checked model of safe composition
Programs of a software product line can be synthesized by composing features which implement a unit of program functionality. In most product lines, only some combination of featu...
Benjamin Delaware, William R. Cook, Don S. Batory
VTC
2008
IEEE
110views Communications» more  VTC 2008»
15 years 4 months ago
FFT Sign Search with Secondary Code Constraints for GNSS Signal Acquisition
— New GNSS signals are usually characterized by the presence of secondary codes and high data rates that can make the sign of the transmitted signal change each primary code peri...
Daniele Borio
VLDB
1993
ACM
113views Database» more  VLDB 1993»
15 years 1 months ago
An Active Object-Oriented Database: A Multi-Paradigm Approach to Constraint Management
Mb describe the design and implementation of a constraint management facility for our active object-oriented database system called Jasmine/A. The facility includes integrity cons...
Hiroshi Ishikawa, Kazumi Kubota
GLOBECOM
2009
IEEE
15 years 1 months ago
Optimum Allocation of Energy and Spectrum in Power-Controlled Wireless Networks with QoS Constraints
An important performance measure in wireless networks is the manner in which the network can distributively manage its limited energy and spectrum resources, while assuring certain...
Stepán Kucera, Ludek Kucera, Bing Zhang
FMOODS
2006
14 years 11 months ago
Security Issues in Service Composition
Abstract. We use a distributed, enriched -calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...