Sciweavers

3555 search results - page 705 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
81
Voted
ICFP
2008
ACM
15 years 9 months ago
A functional model-view-controller software architecture for command-oriented programs
Command-oriented functional programs are currently structured in an ad hoc way that makes the development of multiple userinterfaces difficult and error prone, and makes it diffic...
Alley Stoughton
ICARCV
2008
IEEE
140views Robotics» more  ICARCV 2008»
15 years 4 months ago
Gaining colour stability in live image capturing
Digital colour cameras are dramatically falling in price, making them affordable for ubiquitous appliances in many applications. An attempt to use colour information reveals a si...
Guy K. Kloss, Napoleon H. Reyes, Martin J. Johnson...
ICSM
2007
IEEE
15 years 3 months ago
Evaluation of Semantic Interference Detection in Parallel Changes: an Exploratory Experiment
Parallel developments are becoming increasingly prevalent in the building and evolution of large-scale software systems. Our previous studies of a large industrial project showed ...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
ACMDIS
2006
ACM
15 years 3 months ago
External representations in ubiquitous computing design and the implications for design tools
One challenge for ubiquitous computing is providing appropriate tools for professional designers, thus leading to stronger user-valued applications. Unlike many previous tool-buil...
Steven Dow, T. Scott Saponas, Yang Li, James A. La...
ISCA
2003
IEEE
104views Hardware» more  ISCA 2003»
15 years 2 months ago
Token Coherence: Decoupling Performance and Correctness
Many future shared-memory multiprocessor servers will both target commercial workloads and use highly-integrated “glueless” designs. Implementing low-latency cache coherence i...
Milo M. K. Martin, Mark D. Hill, David A. Wood