Sciweavers

5900 search results - page 181 / 1180
» Dependable Systems
Sort
View
ICSE
1995
IEEE-ACM
15 years 8 months ago
Reverse Engineering of Legacy Systems: A Path Toward Success
This paper addresses the question of whether the reverse engineering of legacy systems is doomed to failure. Our position is that the answer is highly dependent on the specific go...
Alex Quilici
COMPUTER
1998
131views more  COMPUTER 1998»
15 years 4 months ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
15 years 11 months ago
Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior
The ultra-large-scale systems of the future require the transformation of software engineering into a computational discipline capable of fast and dependable software development....
Richard C. Linger, Mark G. Pleszkoch, Luanne Burns...
ICCAD
2005
IEEE
105views Hardware» more  ICCAD 2005»
16 years 2 months ago
Weighted control scheduling
Abstract — This paper describes a practical technique for the optimal scheduling of control dominated systems minimizing the weighted average latency over all control branches. S...
Aravind Vijayakumar, Forrest Brewer
CSFW
1998
IEEE
15 years 9 months ago
Data Level Inference Detection in Database Systems
Existing work on inference detection for database systems mainly employ functional dependencies in the database schema to detect inferences. It has been noticed that analyzing the...
Raymond W. Yip, Karl N. Levitt