Sciweavers

2608 search results - page 483 / 522
» Issue Management
Sort
View
ISSTA
2009
ACM
15 years 6 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
MOBILWARE
2009
ACM
15 years 6 months ago
Pervasive Adaptation in Car Crowds
Abstract. Advances in the miniaturization and embedding of electronics for microcomputing, communication and sensor/actuator systems, have fertilized the pervasion of technology in...
Alois Ferscha, Andreas Riener
97
Voted
SIGCOMM
2009
ACM
15 years 6 months ago
Accountability in hosted virtual networks
Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual networks...
Eric Keller, Ruby B. Lee, Jennifer Rexford
SIGECOM
2009
ACM
134views ECommerce» more  SIGECOM 2009»
15 years 6 months ago
On representing coalitional games with externalities
We consider the issue of representing coalitional games in multiagent systems with externalities (i.e., in systems where the performance of one coalition may be affected by other ...
Tomasz P. Michalak, Talal Rahwan, Jacek Sroka, And...
SIGMETRICS
2009
ACM
165views Hardware» more  SIGMETRICS 2009»
15 years 6 months ago
Understanding intrinsic characteristics and system implications of flash memory based solid state drives
Flash Memory based Solid State Drive (SSD) has been called a “pivotal technology” that could revolutionize data storage systems. Since SSD shares a common interface with the t...
Feng Chen, David A. Koufaty, Xiaodong Zhang