Sciweavers

20833 search results - page 3927 / 4167
» Hidden process models
Sort
View
RTSS
1998
IEEE
15 years 8 months ago
Improved Response-Time Analysis Calculations
Schedulability analysis of fixed priority preemptive scheduled systems can be performed by calculating the worst-case response-time of the involved processes. The system is deemed...
Mikael Sjödin, Hans Hansson
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
15 years 8 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards
MOBICOM
1996
ACM
15 years 8 months ago
Building Reliable Mobile-Aware Applications Using the Rover Toolkit
This paper discusses extensions to the Rover toolkit for constructing reliable mobile-aware applications. The extensions improve upon the existing failure model, which only addres...
Anthony D. Joseph, M. Frans Kaashoek
SIGCOMM
1994
ACM
15 years 8 months ago
An Architecture for Wide-Area Multicast Routing
Existing multicast routing mechanisms were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. When group members, and sende...
Stephen E. Deering, Deborah Estrin, Dino Farinacci...
DBPL
1989
Springer
165views Database» more  DBPL 1989»
15 years 8 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
« Prev « First page 3927 / 4167 Last » Next »