Sciweavers

5790 search results - page 671 / 1158
» Distributed programming with distributed authorization
Sort
View
ICML
2008
IEEE
16 years 5 months ago
Fast estimation of first-order clause coverage through randomization and maximum likelihood
In inductive logic programming, subsumption is a widely used coverage test. Unfortunately, testing -subsumption is NP-complete, which represents a crucial efficiency bottleneck fo...
Filip Zelezný, Ondrej Kuzelka
SPAA
2009
ACM
16 years 4 months ago
Brief announcement: selfishness in transactional memory
In order to be efficient with selfish programmers, a multicore transactional memory (TM) system must be designed such that it is compatible with good programming incentives (GPI),...
Raphael Eidenbenz, Roger Wattenhofer
APSEC
2009
IEEE
15 years 11 months ago
Assessing and Estimating Corrective, Enhancive, and Reductive Maintenance Tasks: A Controlled Experiment
— This paper describes a controlled experiment of student programmers performing maintenance tasks on a C++ program. The goal of the study is to assess the maintenance size, effo...
Vu Nguyen, Barry W. Boehm, Phongphan Danphitsanuph...
ICTAI
2008
IEEE
15 years 10 months ago
Probabilistic Continuous Constraint Satisfaction Problems
Constraint programming has been used in many applications where uncertainty arises to model safe reasoning. The goal of constraint propagation is to propagate intervals of uncerta...
Elsa Carvalho, Jorge Cruz, Pedro Barahona
ISORC
2008
IEEE
15 years 10 months ago
Usability Aspects of WCET Analysis
Knowing the program timing characteristics is fundamental to the successful design and execution of real-time systems. A critical timing measure is the worst-case execution time (...
Jan Gustafsson