Sciweavers

2118 search results - page 361 / 424
» Execution of A Requirement Model in Software Development
Sort
View
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 4 months ago
A Process-Centric Approach for Coordinating Product Configuration Decisions
In product family approaches such as software product lines, product configuration is a key activity that deals with the constrained combination and parameterization of reusable c...
Marcílio Mendonça, Donald D. Cowan, ...
ECOOP
2007
Springer
15 years 3 months ago
Generational Real-Time Garbage Collection
Abstract. While real-time garbage collection is now available in production virtual machines, the lack of generational capability means applications with high allocation rates are ...
Daniel Frampton, David F. Bacon, Perry Cheng, Davi...
ESAW
2006
Springer
15 years 1 months ago
A Norm-Governed Systems Perspective of Ad Hoc Networks
Ad hoc networks are a type of computational system whose members may fail to, or choose not to, comply with the laws governing their behaviour. We are investigating to what extent ...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt
LISA
2007
15 years 1 days ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
ICOODB
2009
246views Database» more  ICOODB 2009»
14 years 7 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia