Sciweavers

670 search results - page 120 / 134
» Software safety: relating software assurance and software in...
Sort
View
JSCIC
2000
187views more  JSCIC 2000»
14 years 11 months ago
A Boundary Condition Capturing Method for Multiphase Incompressible Flow
In [6], the Ghost Fluid Method (GFM) was developed to capture the boundary conditions at a contact discontinuity in the inviscid compressible Euler equations. In [11], related tec...
Myungjoo Kang, Ronald Fedkiw, Xu-Dong Liu
ESTIMEDIA
2009
Springer
14 years 9 months ago
Optimal stack frame placement and transfer for energy reduction targeting embedded processors with scratch-pad memories
Abstract--Memory accesses are a major cause of energy consumption for embedded systems and the stack is a frequent target for data accesses. This paper presents a fully software te...
Lovic Gauthier, Tohru Ishihara
CIKM
2011
Springer
13 years 11 months ago
Ranking-based processing of SQL queries
A growing number of applications are built on top of search engines and issue complex structured queries. This paper contributes a customisable ranking-based processing of such qu...
Hany Azzam, Thomas Roelleke, Sirvan Yahyaei
SAC
2006
ACM
15 years 5 months ago
Evaluation of rule-based modularization in model transformation languages illustrated with ATL
This paper studies ways for modularizing transformation definitions in current rule-based model transformation languages. Two scenarios are shown in which the modular units are id...
Ivan Kurtev, Klaas van den Berg, Fréd&eacut...
KBSE
2002
IEEE
15 years 4 months ago
Process Support for Tools Interoperability
Commercial tools are heavily used, relatively cheap, well maintained, and provide powerful functionalities. However, composing these tools in order to build larger applications ra...
Anh-Tuyet Le