Sciweavers

8623 search results - page 1488 / 1725
» Software engineering for secure systems
Sort
View
JOT
2008
124views more  JOT 2008»
15 years 5 months ago
Methodological Proposal for Business Process Management sustained in the use of Patterns
At the moment, enterprises require complex business models with an organizational structures, processes and systems that must be explicitly designed. The work designed by these bu...
Pedro Bonillo, Nancy Zambrano, Alecia Eleonora Aco...
TOSEM
2010
159views more  TOSEM 2010»
15 years 3 months ago
Clone region descriptors: Representing and tracking duplication in source code
n the concept of abstract clone region descriptors (CRDs), which describe clone regions using a combination of their syntactic, structural, and lexical information. We present our ...
Ekwa Duala-Ekoko, Martin P. Robillard
IPPS
2010
IEEE
15 years 2 months ago
Efficient hardware support for the Partitioned Global Address Space
We present a novel architecture of a communication engine for non-coherent distributed shared memory systems. The shared memory is composed by a set of nodes exporting their memory...
Holger Fröning, Heiner Litz
POPL
2011
ACM
14 years 8 months ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...
WWW
2004
ACM
16 years 5 months ago
A web services architecture for learning object discovery and assembly
Courseware systems are often based on an assembly of different components, addressing the different needs of storage and delivery functionality. The Learning Technology Standard A...
Claus Pahl, Ronan Barrett
« Prev « First page 1488 / 1725 Last » Next »