Sciweavers

3792 search results - page 674 / 759
» Techniques for Trusted Software Engineering
Sort
View
94
Voted
AOSD
2005
ACM
15 years 6 months ago
abc: an extensible AspectJ compiler
Abstract. Research in the design of aspect-oriented programming languages requires a workbench that facilitates easy experimentation with new language features and implementation t...
Pavel Avgustinov, Aske Simon Christensen, Laurie J...
113
Voted
IUI
2005
ACM
15 years 6 months ago
How to wreck a nice beach you sing calm incense
A principal problem in speech recognition is distinguishing between words and phrases that sound similar but have different meanings. Speech recognition programs produce a list of...
Henry Lieberman, Alexander Faaborg, Waseem Daher, ...
122
Voted
VSTTE
2005
Springer
15 years 6 months ago
From the How to the What
In this paper, we consider the Grand Challenge under a very specific perspective: the enabling of application experts without programming knowledge to reliably model their busines...
Tiziana Margaria, Bernhard Steffen
132
Voted
IUI
2004
ACM
15 years 6 months ago
An intelligent assistant for interactive workflow composition
Complex applications in many areas, including scientific computations and business-related web services, are created from collections of components to form workflows. In many case...
Jihie Kim, Marc Spraragen, Yolanda Gil
108
Voted
EMSOFT
2004
Springer
15 years 6 months ago
Approximation of the worst-case execution time using structural analysis
We present a technique to approximate the worst-case execution time that combines structural analysis with a loop-bounding algorithm based on local induction variable analysis. St...
Matteo Corti, Thomas R. Gross