Sciweavers

4048 search results - page 475 / 810
» Design Science, Engineering Science and Requirements Enginee...
Sort
View
SPIN
2012
Springer
13 years 7 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
143
Voted
ACMSE
2007
ACM
15 years 9 months ago
Change propagations in the maintenance of kernel-based software with a study on Linux
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
Liguo Yu, Srini Ramaswamy
179
Voted
TDSC
2011
14 years 12 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
IJHPCA
2011
201views more  IJHPCA 2011»
15 years 9 hour ago
The International Exascale Software Project roadmap
  Over the last twenty years, the open source community has provided more and more software on which the world’s High Performance Computing (HPC) systems depend for performance ...
Jack Dongarra, Peter H. Beckman, Terry Moore, Patr...
WWW
2003
ACM
16 years 5 months ago
KAON SERVER - A Semantic Web Management System
The growing use of ontologies in applications creates the need for an infrastructure that allows developers to more easily combine different software modules like ontology stores,...
Raphael Volz, Daniel Oberle, Steffen Staab, Boris ...