Sciweavers

7189 search results - page 449 / 1438
» Connecting Design with Code
Sort
View
CN
2007
99views more  CN 2007»
15 years 5 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
HPCA
2012
IEEE
14 years 17 days ago
BulkSMT: Designing SMT processors for atomic-block execution
Multiprocessor architectures that continuously execute atomic blocks (or chunks) of instructions can improve performance and software productivity. However, all of the prior propo...
Xuehai Qian, Benjamin Sahelices, Josep Torrellas
CHI
2007
ACM
16 years 5 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
COMPSAC
2008
IEEE
15 years 11 months ago
Behavioral Dependency Measurement for Change-Proneness Prediction in UML 2.0 Design Models
During the development and maintenance of ObjectOriented (OO) software, the information on the classes which are more prone to be changed is very useful. Developers and maintainer...
Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui H...
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 11 months ago
Queuing with Adaptive Modulation over MIMO Wireless Links for Deadline Constrained Traffic: Cross-Layer Analysis and Design
In this paper, we consider a deadline constrained traffic and analyze the joint effects of packet queuing and adaptive modulation (AM) for packet transmission in MIMO systems. We p...
Jalil S. Harsini, Farshad Lahouti