Sciweavers

3441 search results - page 228 / 689
» Provenance of Software Development Processes
Sort
View
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
15 years 5 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
IIE
2007
116views more  IIE 2007»
15 years 4 months ago
Turtle's Navigation and Manipulation of Geometrical Figures Constructed by Variable Processes in a 3d Simulated Space
Abstract. Issues related to 3d turtle’s navigation and geometrical figures’ manipulation in the simulated 3d space of a newly developed computational environment, MaLT, are re...
Chronis Kynigos, Maria Latsi
ICSE
2011
IEEE-ACM
14 years 7 months ago
Configuring global software teams: a multi-company analysis of project productivity, quality, and profits
In this paper, we examined the impact of project-level configurational choices of globally distributed software teams on project productivity, quality, and profits. Our analysis u...
Narayan Ramasubbu, Marcelo Cataldo, Rajesh Krishna...
WORDS
2003
IEEE
15 years 9 months ago
Middleware Support for Embedded Software with Multiple QoS Properties for Ubiquitous Computing Environments
Ubiquitous application software usually has multiple QoS requirements, such as situationawareness, real-time, and security, which make the application software development complic...
Stephen S. Yau, Yu Wang, Dazhi Huang
APSEC
2008
IEEE
15 years 6 months ago
A Verification Framework for FBD Based Software in Nuclear Power Plants
Formal verification of Function Block Diagram (FBD) based software is an essential task when replacing traditional relay-based analog system with PLC-based software in nuclear rea...
Junbeom Yoo, Sung Deok Cha, Eunkyoung Jee