Sciweavers

1700 search results - page 69 / 340
» Specifying and implementing refactorings
Sort
View
SCM
2003
15 years 5 months ago
Dissecting Configuration Management Policies
A configuration management policy specifies the procedures through which a user evolves artifacts stored in a configuration management system. Different configuration management sy...
Ronald van der Lingen, André van der Hoek
IM
1997
15 years 5 months ago
Active Objects in TMN
Telecommunications Management Network (TMN) systems use the object-oriented information modelling techniques and communication facilities provided by OSI Systems Management (SM). ...
Anastasia Vassila, George Pavlou, Graham Knight
JNSM
2007
138views more  JNSM 2007»
15 years 4 months ago
High-Speed Dynamic Packet Filtering
One problem encountered while monitoring gigabit networks, is the need to filter only those packets that are interesting for a given task while ignoring the others. Popular packet...
Luca Deri
AAMAS
2002
Springer
15 years 4 months ago
A Scheduling Scheme for Controlling Allocation of CPU Resources for Mobile Programs
There is considerable interest in developing runtime infrastructures for programs that can migrate from one host to another. Mobile programs are appealing because they support eff...
Manoj Lal, Raju Pandey
ASE
2002
160views more  ASE 2002»
15 years 4 months ago
Proving Invariants of I/O Automata with TAME
This paper describes a specialized interface to PVS called TAME (Timed Automata Modeling Environment) which provides automated support for proving properties of I/O automata. A maj...
Myla Archer, Constance L. Heitmeyer, Elvinia Ricco...