Sciweavers

1620 search results - page 113 / 324
» Use Case Level Pointcuts
Sort
View
FIW
2009
139views Communications» more  FIW 2009»
15 years 1 months ago
Problem-Solution Feature Interactions as Configuration Knowledge in Distributed Runtime Adaptations
Abstract. Current generative programming approaches use configuration knowledge to automatically manufacture an end product given a particular requirements specification. Such conf...
Frans Sanen, Eddy Truyen, Wouter Joosen
110
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
ASPDAC
2001
ACM
100views Hardware» more  ASPDAC 2001»
15 years 7 months ago
Low power implementation of a turbo-decoder on programmable architectures
Low Power is an extremely important issue for future mobile radio systems. Channel decoders are essential building blocks of base-band signal processing units in mobile terminal ar...
Frank Gilbert, Alexander Worm, Norbert Wehn
ISSA
2008
15 years 4 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
IPPS
2009
IEEE
15 years 10 months ago
Handling OS jitter on multicore multithreaded systems
Various studies have shown that OS jitter can degrade parallel program performance considerably at large processor counts. Most sources of system jitter fall broadly into 5 catego...
Pradipta De, Vijay Mann, Umang Mittaly