Sciweavers

9316 search results - page 58 / 1864
» Analysis of traceback techniques
Sort
View
ECRTS
2009
IEEE
14 years 7 months ago
Precise Worst-Case Execution Time Analysis for Processors with Timing Anomalies
This paper explores timing anomalies in WCET analysis. Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify ...
Raimund Kirner, Albrecht Kadlec, Peter P. Puschner
ISSTA
2012
ACM
13 years 9 days ago
Detecting inconsistencies via universal reachability analysis
Recent research has suggested that a large class of software bugs fall into the category of inconsistencies, or cases where two pieces of program code make incompatible assumption...
Aaron Tomb, Cormac Flanagan
ICWSM
2009
14 years 7 months ago
A Comparative Analysis of Trust-Enhanced Recommenders for Controversial Items
A particularly challenging task for recommender systems (RSs) is deciding whether to recommend an item that received a variety of high and low scores from its users. RSs that inco...
Patricia Victor, Chris Cornelis, Martine De Cock, ...
ISITA
2010
14 years 7 months ago
Performance analysis and optimal power allocation for hybrid incremental relaying
Relaying technique has been developed considerable attention in response to improve reliability and to extend wireless network coverage. One of conventional relaying technique, inc...
Jaeyoung Lee, Sung-il Kim, Jun Heo
ICDAR
2009
IEEE
15 years 4 months ago
A Survey of Techniques for Document and Archaeology Artefact Reconstruction
An automated assembling of shredded/torn documents (2D) or broken pottery (3D) will support philologists, archaeologists and forensic experts. An automated solution for this task ...
Florian Kleber, Robert Sablatnig