Sciweavers

837 search results - page 63 / 168
» Hard combinators
Sort
View
SCAM
2008
IEEE
15 years 6 months ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
ASWEC
2007
IEEE
15 years 6 months ago
Supporting OO Design Heuristics
Heuristics have long been recognised as a way to tackle problems which are intractable because of their size or complexity. They have been used in software engineering for purpose...
Neville Churcher, Sarah Frater, Cong Phuoc Huynh, ...
CCGRID
2007
IEEE
15 years 6 months ago
Adaptive Performance Modeling on Hierarchical Grid Computing Environments
In the past, efficient parallel algorithms have always been developed specifically for the successive generations of parallel systems (vector machines, shared-memory machines, d...
Wahid Nasri, Luiz Angelo Steffenel, Denis Trystram
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 6 months ago
Network-Wide Resource Optimization of Wireless OFDMA Mesh Networks with Multiple Radios
— We consider the problem of joint end-to-end rate optimization and radio resource management in wireless OFDMA-based mesh networks. Radio units equipped with multiple radio inte...
Pablo Soldati, Mikael Johansson
INFOCOM
2007
IEEE
15 years 6 months ago
Tree, Segment Table, and Route Bucket: A Multi-Stage Algorithm for IPv6 Routing Table Lookup
—Next generation internet protocol, IPv6, has attracted growing attention and has been deploying worldwide. With 128-bit address, IPv6 provides an extremely large address space a...
Zhenqiang Li, Dongqu Zheng, Yan Ma