Sciweavers

26354 search results - page 5087 / 5271
» How we refactor, and how we know it
Sort
View
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
15 years 7 months ago
Resource adaptation based on MPEG-21 usage environment descriptions
This paper addresses several aspects related to the distribution of content. The first aim is to provide an overview of the Universal Multimedia Access (UMA) concept. The primary...
Huifang Sun, Anthony Vetro, K. Asai
MICRO
2003
IEEE
132views Hardware» more  MICRO 2003»
15 years 7 months ago
Checkpoint Processing and Recovery: Towards Scalable Large Instruction Window Processors
Large instruction window processors achieve high performance by exposing large amounts of instruction level parallelism. However, accessing large hardware structures typically req...
Haitham Akkary, Ravi Rajwar, Srikanth T. Srinivasa...
115
Voted
P2P
2003
IEEE
108views Communications» more  P2P 2003»
15 years 7 months ago
Multicast in DKS(N, k, f) Overlay Networks
Recent developments in the area of peer-to-peer computing show that structured overlay networks implementing distributed hash tables scale well and can serve as infrastructures fo...
Luc Onana Alima, Ali Ghodsi, Sameh El-Ansary, Per ...
103
Voted
AOSD
2003
ACM
15 years 7 months ago
Modularisation and composition of aspectual requirements
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Awais Rashid, Ana M. D. Moreira, João Ara&u...
GROUP
2003
ACM
15 years 7 months ago
"Breaking the code", moving between private and public work in collaborative software development
Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is esp...
Cleidson R. B. de Souza, David F. Redmiles, Paul D...
« Prev « First page 5087 / 5271 Last » Next »