Sciweavers

4722 search results - page 600 / 945
» Encoding Program Executions
Sort
View
166
Voted
PODS
1995
ACM
139views Database» more  PODS 1995»
15 years 7 months ago
Normalizing Incomplete Databases
Databases are often incomplete because of the presence of disjunctive information, due to con icts, partial knowledge and other reasons. Queries against such databases often ask q...
Leonid Libkin
136
Voted
IJFCS
2006
110views more  IJFCS 2006»
15 years 4 months ago
Sat-based Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Fang Yu, Bow-Yaw Wang
JOT
2008
72views more  JOT 2008»
15 years 4 months ago
Fixing Apples' Broken Clipboard, with Java
The Mac OS X clipboard is infamous for changing the format of bit-mapped images that are pasted to it. These images are typically encoded using a QuickTime Tiff compressor that re...
Douglas A. Lyon
ICDE
2012
IEEE
277views Database» more  ICDE 2012»
13 years 6 months ago
Aggregate Query Answering on Possibilistic Data with Cardinality Constraints
— Uncertainties in data arise for a number of reasons: when the data set is incomplete, contains conflicting information or has been deliberately perturbed or coarsened to remov...
Graham Cormode, Divesh Srivastava, Entong Shen, Ti...
ICSE
2008
IEEE-ACM
16 years 4 months ago
An empirical study of the effects of test-suite reduction on fault localization
Fault-localization techniques that utilize information about all test cases in a test suite have been presented. These techniques use various approaches to identify the likely fau...
Yanbing Yu, James A. Jones, Mary Jean Harrold