Sciweavers

2015 search results - page 363 / 403
» Hidden Software Capabilities
Sort
View
109
Voted
COMPSAC
1996
IEEE
15 years 4 months ago
Handling Multimedia Data for Mobile Computers
Mobile clients have unusual needs for sending and receiving multimedia data. The traditional client/server paradigm does not take into account variable network conditions; thus tr...
Charles E. Perkins
107
Voted
IWSSD
1993
IEEE
15 years 4 months ago
An Active Hypertext Model for System Requirements
We are developing tools to support a conversational metaphor for requirements definition and analysis. Our conversational model consists of three components: (1) a hypertextual re...
Colin Potts, Kenji Takahashi
82
Voted
TAPSOFT
1993
Springer
15 years 4 months ago
Exception Handling and Term Labelling
: We propose a new algebraic framework for exception handling which is powerful enough to cope with many exception handling features such that recovery, implicit propagation of exc...
Gilles Bernot, Pascale Le Gall
109
Voted
COMPSAC
2007
IEEE
15 years 4 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
CODES
2004
IEEE
15 years 4 months ago
A loop accelerator for low power embedded VLIW processors
The high transistor density afforded by modern VLSI processes have enabled the design of embedded processors that use clustered execution units to deliver high levels of performan...
Binu K. Mathew, Al Davis