Sciweavers

3316 search results - page 388 / 664
» Mining Software Engineering Data
Sort
View
USAB
2010
15 years 1 months ago
Social Acceptance of Negotiation Support Systems
We investigate people’s attitudes towards the possible use of mobile negotiation support systems (NSS) in different social contexts and the consequences for their design. For tha...
Alina Pommeranz, Pascal Wiggers, Willem-Paul Brink...
VLSI
2010
Springer
15 years 1 months ago
Design and feasibility of multi-Gb/s quasi-serial vertical interconnects based on TSVs for 3D ICs
—This paper proposes a novel technique to exploit the high bandwidth offered by through silicon vias (TSVs). In the proposed approach, synchronous parallel 3D links are replaced ...
Fengda Sun, Alessandro Cevrero, Panagiotis Athanas...
ICFEM
2010
Springer
15 years 1 months ago
Reasoning about Safety and Progress Using Contracts
Designing concurrent or distributed systems with complex architectures while preserving a set of high-level requirements through all design steps is not a trivial task. Building up...
Imene Ben Hafaiedh, Susanne Graf, Sophie Quinton
WCET
2010
15 years 28 days ago
Realism in Statistical Analysis of Worst Case Execution Times
This paper considers the use of Extreme Value Theory (EVT) to model worst-case execution times. In particular it considers the sacrifice that statistical methods make in the reali...
David Griffin, Alan Burns
SOCO
2011
Springer
14 years 10 months ago
Retransmission steganography and its detection
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms...
Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof S...