Sciweavers

1192 search results - page 64 / 239
» Computing Weakest Readings
Sort
View
ERSHOV
2006
Springer
15 years 1 months ago
On the Usage of Concrete Syntax in Model Transformation Rules
Graph transformations are one of the best known approaches for defining transformations in model-based software development. They are defined over the abstract syntax of source and...
Thomas Baar, Jon Whittle
AINA
2008
IEEE
15 years 1 days ago
Updated Data Dissemination for Applications with Time Constraints in Mobile Ad Hoc Networks
In our previous work, we proposed few updated data dissemination methods to refresh old replicas efficiently in mobile ad hoc networks. These methods disseminate updated data item...
Takahiro Hara, Sanjay Kumar Madria

Book
5690views
16 years 9 months ago
The OpenGL Reference Manual - The Bluebook
"This manual is designed to be used as the companion reference volume to the OpenGL Programming Guide by Jackie Neider, Tom Davis, and Mason Woo (Reading, MA: Addison-Wesley P...
Dave Shreiner
HPCA
2007
IEEE
16 years 7 days ago
A Burst Scheduling Access Reordering Mechanism
Utilizing the nonuniform latencies of SDRAM devices, access reordering mechanisms alter the sequence of main memory access streams to reduce the observed access latency. Using a r...
Jun Shao, Brian T. Davis
ICDCS
2007
IEEE
15 years 6 months ago
A High Throughput Atomic Storage Algorithm
This paper presents an algorithm to ensure the atomicity of a distributed storage that can be read and written by any number of clients. In failure-free and synchronous situations...
Rachid Guerraoui, Dejan Kostic, Ron R. Levy, Vivie...