Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 44, Issue 12December 2014
Reflects downloads up to 06 Oct 2024Bibliometrics
Skip Table Of Content Section
article
A visual language-based system for extraction-transformation-loading development

Data warehouse loading and refreshment is typically performed by means of complex software processes called extraction-transformation-loading ETL. In this paper, we propose a system based on a suite of visual languages for mastering several aspects of ...

article
Resource partitioning for Integrated Modular Avionics: comparative study of implementation alternatives

Most current generation avionics systems are based on a federated architecture, where an electronic device runs a single software module or application that collaborates with other devices through a network. This architecture makes the software ...

article
Drawing non-layered tidy trees in linear time

The well-known Reingold-Tilford algorithm produces tidy-layered drawings of trees: drawings where all nodes at the same depth are vertically aligned. However, when nodes have varying heights, layered drawing may use more vertical space than necessary. A ...

article
Making context-sensitive inclusion-based pointer analysis practical for compilers using parameterised summarisation

Because of its high precision as a flow-insensitive pointer analysis, Andersen's analysis has been deployed in some modern optimising compilers. To obtain improved precision, we describe how to add context sensitivity on top of Andersen's analysis. The ...

article
The use of mTags for mandatory security: a case study

mTags is an efficient mechanism that augments inter-thread messages with lightweight metadata. We introduce and discuss a case study that we have conducted in the use of mTags for realizing a kind of mandatory security. Although mTags can be implemented ...

article
Identifying composite crosscutting concerns through semi-supervised learning

Aspect mining improves the modularity of legacy software systems through identifying their underlying crosscutting concerns CCs. However, a realistic CC is a composite one that consists of CC seeds and relative program elements, which makes it a great ...

Comments