Sciweavers

8636 search results - page 1316 / 1728
» How Developers Copy
Sort
View
133
Voted
ICS
1999
Tsinghua U.
15 years 9 months ago
Application scaling under shared virtual memory on a cluster of SMPs
In this paper we examine how application performance scales on a state-of-the-art shared virtual memory (SVM) system on a cluster with 64 processors, comprising 4-way SMPs connect...
Dongming Jiang, Brian O'Kelley, Xiang Yu, Sanjeev ...
ICSE
1999
IEEE-ACM
15 years 9 months ago
Avoiding Packaging Mismatch with Flexible Packaging
To integrate a software component into a system, it must interact properly with the system's other components. Unfortunately,the decisions about how a component is to interac...
Robert DeLine
ICSE
1999
IEEE-ACM
15 years 9 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
ICSE
1999
IEEE-ACM
15 years 9 months ago
Pattern-Based Reverse-Engineering of Design Components
Many reverse-engineering tools have been developed to detract representations from source code. Yet, most of these tools completely ignore recovery of the all-important rationale ...
Rudolf K. Keller, Reinhard Schauer, Sébasti...
IWAN
1999
Springer
15 years 9 months ago
Interference and Communications among Active Network Applications
This paper focuses on active networks applications and in particular on the possible interactions among these applications. Active networking is a very promising research field wh...
Luca Delgrossi, Giuseppe Di Fatta, Domenico Ferrar...
« Prev « First page 1316 / 1728 Last » Next »