Sciweavers

3820 search results - page 206 / 764
» Bounded Model Debugging
Sort
View
139
Voted
HICSS
2008
IEEE
172views Biometrics» more  HICSS 2008»
15 years 9 months ago
Semantic Web Services Monitoring: An OWL-S Based Approach
In this paper we describe mechanisms for execution monitoring of semantic web services, based on OWL-S. The use of semantic descriptions and ontologies is a valuable extension to ...
Roman Vaculín, Katia P. Sycara
KBSE
2008
IEEE
15 years 9 months ago
Random Test Run Length and Effectiveness
Abstract—A poorly understood but important factor in random testing is the selection of a maximum length for test runs. Given a limited time for testing, it is seldom clear wheth...
James H. Andrews, Alex Groce, Melissa Weston, Ru-G...
APCSAC
2007
IEEE
15 years 9 months ago
Open Issues in MPI Implementation
MPI (the Message Passing Interface) continues to be the dominant programming model for parallel machines of all sizes, from small Linux clusters to the largest parallel supercomput...
Rajeev Thakur, William Gropp
CODES
2007
IEEE
15 years 9 months ago
HySim: a fast simulation framework for embedded software development
Instruction Set Simulation (ISS) is widely used in system evaluation and software development for embedded processors. Despite the significant advancements in the ISS technology,...
Stefan Kraemer, Lei Gao, Jan Weinstock, Rainer Leu...
KBSE
2007
IEEE
15 years 9 months ago
Test suite reduction and prioritization with call trees
This paper presents a tool that (i) constructs tree-based models of a program’s behavior during testing and (ii) employs these trees while reordering and reducing a test suite. ...
Adam M. Smith, Joshua Geiger, Gregory M. Kapfhamme...