Sciweavers

12836 search results - page 2396 / 2568
» Generalization Methods in Bioinformatics
Sort
View
165
Voted
ACL2
2006
ACM
15 years 9 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews
160
Voted
ACMICEC
2006
ACM
142views ECommerce» more  ACMICEC 2006»
15 years 9 months ago
Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings
In electronic marketplaces populated by self-interested agents, buyer agents would benefit by modeling the reputation of seller agents, in order to make effective decisions abou...
Jie Zhang, Robin Cohen
131
Voted
AOSD
2006
ACM
15 years 9 months ago
A framework and tool supports for generating test inputs of AspectJ programs
Aspect-oriented software development is gaining popularity with the wider adoption of languages such as AspectJ. To reduce the manual effort of testing aspects in AspectJ programs...
Tao Xie, Jianjun Zhao
135
Voted
ASPLOS
2006
ACM
15 years 9 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
169
Voted
CASES
2006
ACM
15 years 9 months ago
Automatic performance model construction for the fast software exploration of new hardware designs
Developing an optimizing compiler for a newly proposed architecture is extremely difficult when there is only a simulator of the machine available. Designing such a compiler requ...
John Cavazos, Christophe Dubach, Felix V. Agakov, ...
« Prev « First page 2396 / 2568 Last » Next »