Sciweavers

7202 search results - page 1384 / 1441
» Software System Engineering: A Tutorial
Sort
View
GI
2003
Springer
15 years 10 months ago
C versus Ada in sicherheitskritischen Applikationen
: In Zukunft wird es verstärkt notwendig sein, sicherheitskritische Systeme statt in Ada in der Programmiersprache C zu implementieren. Die Verwendung von C ist getrieben vom Mang...
Michael Jungmann
240
Voted
WWW
2003
ACM
16 years 5 months ago
Bridging the P2P and WWW Divide with DISCOVIR - DIStributed COntent-based Visual Information Retrieval
In the light of image retrieval evolving from text annotation to content-based and from standalone applications to web-based search engines, we foresee the need for deploying cont...
Ka Cheung Sia, Cheuk Hang Ng, Chi-Hang Chan
154
Voted
MOBISYS
2008
ACM
16 years 4 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
POPL
2010
ACM
16 years 2 months ago
Dependent Types from Counterexamples
d by recent research in abstract model checking, we present a new approach to inferring dependent types. Unlike many of the existing approaches, our approach does not rely on prog...
Tachio Terauchi
EUROSYS
2009
ACM
16 years 1 months ago
Migrating server storage to SSDs: analysis of tradeoffs
Recently, flash-based solid-state drives (SSDs) have become standard options for laptop and desktop storage, but their impact on enterprise server storage has not been studied. P...
Dushyanth Narayanan, Eno Thereska, Austin Donnelly...
« Prev « First page 1384 / 1441 Last » Next »