Sciweavers

21319 search results - page 4087 / 4264
» An Approach for Method Reengineering
Sort
View
ICML
2002
IEEE
16 years 5 months ago
Learning the Kernel Matrix with Semi-Definite Programming
Kernel-based learning algorithms work by embedding the data into a Euclidean space, and then searching for linear relations among the embedded data points. The embedding is perfor...
Gert R. G. Lanckriet, Nello Cristianini, Peter L. ...
ICSE
2008
IEEE-ACM
16 years 5 months ago
A verification system for timed interval calculus
Timed Interval Calculus (TIC) is a highly expressive set-based notation for specifying and reasoning about embedded real-time systems. However, it lacks mechanical proving support...
Chunqing Chen, Jin Song Dong, Jun Sun 0001
SIGSOFT
2008
ACM
16 years 4 months ago
Explicit exception handling variability in component-based product line architectures
Separation of concerns is one of the overarching goals of exception handling in order to keep separate normal and exceptional behaviour of a software system. In the context of a s...
Ivo Augusto Bertoncello, Marcelo Oliveira Dias, Pa...
SIGSOFT
2007
ACM
16 years 4 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
144
Voted
SIGSOFT
2006
ACM
16 years 4 months ago
SYNERGY: a new algorithm for property checking
We consider the problem if a given program satisfies a specified safety property. Interesting programs have infinite state spaces, with inputs ranging over infinite domains, and f...
Bhargav S. Gulavani, Thomas A. Henzinger, Yamini K...
« Prev « First page 4087 / 4264 Last » Next »