Sciweavers

1575 search results - page 269 / 315
» Constraining Software Evolution
Sort
View
ATVA
2009
Springer
117views Hardware» more  ATVA 2009»
15 years 4 months ago
UnitCheck: Unit Testing and Model Checking Combined
Code model checking is a rapidly advancing research topic. However, apart from very constrained scenarios (e.g., verification of device drivers by Slam), the code model checking t...
Michal Kebrt, Ondrej Sery
FSTTCS
2009
Springer
15 years 4 months ago
Iterative Methods in Combinatorial Optimization
We describe a simple iterative method for proving a variety of results in combinatorial optimization. It is inspired by Jain’s iterative rounding method (FOCS 1998) for designing...
R. Ravi
CASES
2009
ACM
15 years 4 months ago
CGRA express: accelerating execution using dynamic operation fusion
Coarse-grained reconfigurable architectures (CGRAs) present an appealing hardware platform by providing programmability with the potential for high computation throughput, scalab...
Yongjun Park, Hyunchul Park, Scott A. Mahlke
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 4 months ago
A Process-Centric Approach for Coordinating Product Configuration Decisions
In product family approaches such as software product lines, product configuration is a key activity that deals with the constrained combination and parameterization of reusable c...
Marcílio Mendonça, Donald D. Cowan, ...
ESAS
2007
Springer
15 years 3 months ago
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
Christoph Krauß, Frederic Stumpf, Claudia M....