Sciweavers

24529 search results - page 4676 / 4906
» Computing on Authenticated Data
Sort
View
ECOOPW
2006
Springer
15 years 7 months ago
AOSD and Reflection: Benefits and Drawbacks to Software Evolution
Following last two years' RAM-SE (Reflection, AOP and Meta-Data for Software Evolution) workshop at the ECOOP conference, the RAM-SE 2006 workshop was a successful and popular...
Walter Cazzola, Shigeru Chiba, Yvonne Coady, Gunte...
208
Voted
EELC
2006
156views Languages» more  EELC 2006»
15 years 7 months ago
The Human Speechome Project
The Human Speechome Project is an effort to observe and computationally model the longitudinal course of language development for a single child at an unprecedented scale. The ide...
Deb Roy, Rupal Patel, Philip DeCamp, Rony Kubat, M...
EMSOFT
2006
Springer
15 years 7 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
EUC
2006
Springer
15 years 7 months ago
Write Back Routine for JFFS2 Efficient I/O
Abstract. When flash memory is used as a storage in embedded systems, block level translation layer is required between conventional filesystem and flash memory chips due to its ph...
Seung Ho Lim, Sung Hoon Baek, Joo Young Hwang, Kyu...
GD
2006
Springer
15 years 7 months ago
The Website for Graph Visualization Software References (GVSR)
Graph drawing software are now commonly used. However, the choice of a well-adapted program may be hard for an inexperienced user. This poster presents a website (http://www.polyte...
Bruno Pinaud, Pascale Kuntz, Fabien Picarougne
« Prev « First page 4676 / 4906 Last » Next »