Sciweavers

1579 search results - page 261 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
HOTOS
1999
IEEE
15 years 2 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
ICSM
1999
IEEE
15 years 2 months ago
Building Documentation Generators
In order to maintain the consistency between sources and documentation, while at the same time providing documentation at the design level, it is necessary to generate documentati...
Arie van Deursen, Tobias Kuipers
IPPS
1999
IEEE
15 years 2 months ago
A Transformational Framework for Skeletal Programs: Overview and Case Study
A structured approach to parallel programming allows to construct applications by composing skeletons, i.e., recurring patterns of task- and data-parallelism. First academic and co...
Sergei Gorlatch, Susanna Pelagatti
DSOM
1999
Springer
15 years 2 months ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...
REFLECTION
1999
Springer
15 years 2 months ago
jContractor: A Reflective Java Library to Support Design by Contract
jContractor is a purely library based approach to support Design By Contract specifications such as preconditions, postconditions, class invariants, and recovery and exception hand...
Murat Karaorman, Urs Hölzle, John L. Bruno