Sciweavers

3311 search results - page 491 / 663
» Deductive Object Programming
Sort
View
116
Voted
DOCENG
2006
ACM
15 years 8 months ago
Live editing of hypermedia documents
In some hypermedia system applications, like interactive digital TV applications, authoring and presentation of documents may have to be done concomitantly. This is the case of li...
Romualdo Monteiro de Resende Costa, Márcio ...
ISSTA
2006
ACM
15 years 8 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
98
Voted
BROADNETS
2005
IEEE
15 years 8 months ago
Network design for IP-centric light trail networks
Abstract— We explore network design principles for nextgeneration all-optical wide-area networks, employing light-trail technology. Light-trail [1] is a light-wave circuit that a...
Srivatsan Balasubramanian, Ahmed E. Kamal, Arun K....
DFT
2005
IEEE
83views VLSI» more  DFT 2005»
15 years 8 months ago
An ILP Formulation for Yield-driven Architectural Synthesis
Data flow graph dominant designs, such as communication video and audio applications, are common in today’s IC industry. In these designs, the datapath resources (e.g., adders,...
Zhaojun Wo, Israel Koren, Maciej J. Ciesielski
WCRE
2005
IEEE
15 years 8 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean