Sciweavers

2111 search results - page 94 / 423
» How to Program Pervasive Systems
Sort
View
85
Voted
ACE
2004
152views Education» more  ACE 2004»
15 years 2 months ago
The Evaluation of Courses in Information Systems
This paper presents a process for evaluating an e-commerce course in order to determine whether the structure and design is appropriate for student learning. Evaluation is importa...
Kay C. Bryant
78
Voted
IJSN
2006
78views more  IJSN 2006»
15 years 18 days ago
An approach to synthesise safe systems
: Detectors are system components that identify whether the system is in a particular state. Detectors can be used to ensure arbitrary safety properties for systems, that is, they ...
Arshad Jhumka, Felix C. Freiling, Christof Fetzer,...
IWPC
2000
IEEE
15 years 5 months ago
Types and Concept Analysis for Legacy Systems
We combine type inference and concept analysis in order to gain insight into legacy software systems. Type inference for COBOL yields the types for variables and program parameter...
Tobias Kuipers, Leon Moonen
118
Voted
ECOOP
1999
Springer
15 years 4 months ago
Providing Persistent Objects in Distributed Systems
THOR is a persistent object store that provides a powerful programming model. THOR ensures that persistent objects are accessed only by calling their methods and it supports atomic...
Barbara Liskov, Miguel Castro, Liuba Shrira, Atul ...
PLDI
2010
ACM
15 years 5 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...