Sciweavers

2266 search results - page 201 / 454
» How Not to Evaluate a Developmental System
Sort
View
72
Voted
EDCC
2006
Springer
15 years 1 months ago
Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices
Mobile devices are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. We consider a fault-tolerance approach that exploits sp...
Ludovic Courtès, Marc-Olivier Killijian, Da...
FLOPS
2008
Springer
14 years 11 months ago
Certified Exact Real Arithmetic Using Co-induction in Arbitrary Integer Base
In this paper we describe some certified algorithms for exact real arithmetic based on co-recursion. Our work is based on previous experiences using redundant digits of base 2 but ...
Nicolas Julien
FMCAD
2008
Springer
14 years 11 months ago
A Theory of Mutations with Applications to Vacuity, Coverage, and Fault Tolerance
The quality of formal specifications and the circuits they are written for can be evaluated through checks such as vacuity and coverage. Both checks involve mutations to the specif...
Orna Kupferman, Wenchao Li, Sanjit A. Seshia
81
Voted
BNCOD
2007
160views Database» more  BNCOD 2007»
14 years 11 months ago
Parameterized XPath Views
: We present a new approach for accelerating the execution of XPath expressions using parameterized materialized XPath views (PXV). While the approach is generic we show how it can...
Timo Böhme, Erhard Rahm
98
Voted
WSC
2001
14 years 11 months ago
Use of DaSSF in a scalable multiprocessor wireless simulation architecture
The problem of efficient load distribution and scaling of large-scale wireless communication system simulation on multiprocessor architectures (both shared memory and cluster arra...
Trefor J. Delve, Nathan Smith