Sciweavers

1548 search results - page 248 / 310
» Estimating Software Vulnerabilities
Sort
View
QOSA
2010
Springer
15 years 3 months ago
Evaluating Maintainability with Code Metrics for Model-to-Model Transformations
Using model-to-model transformations to generate analysis models or code from architecture models is sought to promote compliance and reuse of components. The maintainability of tr...
Lucia Kapová, Thomas Goldschmidt, Steffen B...
APSEC
2004
IEEE
15 years 2 months ago
Modeling the Impact of a Learning Phase on the Business Value of a Pair Programming Project
Pair programmers need a "warmup phase" before the pair can work at full speed. The length of the learning interval varies, depending on how experienced the developers are...
Frank Padberg, Matthias M. Müller
CGO
2004
IEEE
15 years 2 months ago
FLASH: Foresighted Latency-Aware Scheduling Heuristic for Processors with Customized Datapaths
Application-specific instruction set processors (ASIPs) have the potential to meet the challenging cost, performance, and power goals of future embedded processors by customizing ...
Manjunath Kudlur, Kevin Fan, Michael L. Chu, Rajiv...
CAMP
2005
IEEE
15 years 1 months ago
An Open System for 3D Data Acquisition from Multiple Sensor
Abstract— This paper describes a work in progress on a multisensor system for 3D data acquisition. The system core structure is a 3D-range scan based on the well known active tri...
Francesco Isgrò, Francesca Odone, Alessandr...
98
Voted
CODES
2008
IEEE
15 years 28 days ago
A time-predictable system initialization design for huge-capacity flash-memory storage systems
The capacity of flash-memory storage systems grows at a speed similar to many other storage systems. In order to properly manage the product cost, vendors face serious challenges ...
Chin-Hsien Wu