Sciweavers

1897 search results - page 214 / 380
» Early application identification
Sort
View
COMPSAC
1999
IEEE
15 years 9 months ago
Detecting Null Pointer Violations in Java Programs
The use of formal methods has been growing steadily and there have been a number of successful applications of formal methods in a range of application areas. It seems agreed that...
Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiri...
HOTOS
1999
IEEE
15 years 9 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
SIGADA
1999
Springer
15 years 9 months ago
Building Tcl-Tk GUIs for HRT-HOOD systems
This work explores Tcl-Tk 8.0 as a tool to easily build script based GUIs for Ada95 realtime systems. Tcl-Tk 8.0 is a library that makes graphic programming easier, but it suffers...
Juan Carlos Díaz Martín, Isidro Iral...
VLDB
1999
ACM
133views Database» more  VLDB 1999»
15 years 9 months ago
Online Dynamic Reordering for Interactive Data Processing
We present a pipelining, dynamically usercontrollable reorder operator, for use in dataintensive applications. Allowing the user to reorder the data delivery on the fly increases...
Vijayshankar Raman, Bhaskaran Raman, Joseph M. Hel...
EICS
2010
ACM
15 years 9 months ago
WebWOZ: a wizard of oz prototyping framework
Language Technology (LT) based applications become more popular as technology improves. Prototyping early in the design process is critical for the development of high quality app...
Stephan Schlögl, Gavin Doherty, Nikiforos Kar...