Sciweavers

3898 search results - page 371 / 780
» Maintaining Component-Based Systems
Sort
View
163
Voted
ESE
2008
112views Database» more  ESE 2008»
15 years 5 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
PRL
2008
142views more  PRL 2008»
15 years 4 months ago
Highly accurate error-driven method for noun phrase detection
We present a new model for detection of noun phrases in unrestricted text, whose most outstanding feature is its flexibility: the system is able to recognize noun phrases similar ...
Lourdes Araujo, Jose Ignacio Serrano
PE
2006
Springer
91views Optimization» more  PE 2006»
15 years 4 months ago
Performance of peer-to-peer networks: Service capacity and role of resource sharing policies
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...
Xiangying Yang, Gustavo de Veciana
RTAS
2010
IEEE
15 years 3 months ago
Selecting Server Parameters for Predictable Runtime Monitoring
—Application of runtime monitoring to maintain the health of an embedded real-time software system requires that anomalous behavior be detected within a bounded time while preser...
Haitao Zhu, Steve Goddard, Matthew B. Dwyer
265
Voted
MOBISYS
2011
ACM
14 years 7 months ago
Indoor location sensing using geo-magnetism
We present an indoor positioning system that measures location using disturbances of the Earth's magnetic field caused by structural steel elements in a building. The presenc...
Jaewoo Chung, Matt Donahoe, Chris Schmandt, Ig-Jae...