Sciweavers

1448 search results - page 222 / 290
» From Requirements to Code Revisited
Sort
View
CONEXT
2008
ACM
15 years 3 months ago
High-throughput, reliable multicast without "crying babies" in wireless mesh networks
There are two primary challenges to supportinghigh-throughput, reliable multicast in wireless mesh networks (WMNs). The first is no different from unicast: wireless links are inhe...
Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun ...
DSN
2008
IEEE
15 years 3 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
DSVIS
2008
Springer
15 years 3 months ago
ReWiRe: Designing Reactive Systems for Pervasive Environments
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
ECTEL
2008
Springer
15 years 3 months ago
Bridging the Gap between Practitioners and E-Learning Standards: A Domain-Specific Modeling Approach
Developing a learning design using IMS Learning Design (LD) is difficult for average practitioners because a high overhead of pedagogical knowledge and technical knowledge is requi...
Yongwu Miao, Tim Sodhi, Francis Brouns, Peter B. S...
AAAI
2010
15 years 3 months ago
Evolving Compiler Heuristics to Manage Communication and Contention
As computer architectures become increasingly complex, hand-tuning compiler heuristics becomes increasingly tedious and time consuming for compiler developers. This paper presents...
Matthew E. Taylor, Katherine E. Coons, Behnam Roba...