Sciweavers

10568 search results - page 1872 / 2114
» Computer Intelligence and Formalization
Sort
View
135
Voted
EMSOFT
2010
Springer
15 years 1 months ago
Initiating a design pattern catalog for embedded network systems
In the domain of desktop software, design patterns have had a profound impact; they are applied ubiquitously across a broad range of applications. Patterns serve both to promulgat...
Sally K. Wahba, Jason O. Hallstrom, Neelam Soundar...
143
Voted
ICSE
2010
IEEE-ACM
15 years 1 months ago
Synthesized essence: what game jams teach about prototyping of new software products
The development of video games comprises engineering teams within various disciplines, e.g., software engineering, game production, and creative arts. Game jams are a promising ap...
Juergen Musil, Angelika Schweda, Dietmar Winkler, ...
146
Voted
ICTAC
2010
Springer
15 years 1 months ago
Mechanized Verification with Sharing
We consider software verification of imperative programs by theorem proving in higher-order separation logic. Of particular interest are the difficulties of encoding and reasoning ...
J. Gregory Malecha, Greg Morrisett
IMC
2010
ACM
15 years 1 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
IPPS
2010
IEEE
15 years 1 months ago
Scalable multi-pipeline architecture for high performance multi-pattern string matching
Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed deep packet inspection (DPI). Although Aho...
Weirong Jiang, Yi-Hua Edward Yang, Viktor K. Prasa...
« Prev « First page 1872 / 2114 Last » Next »