Sciweavers

3256 search results - page 293 / 652
» Mixin-Based Programming in C
Sort
View
WSC
2000
15 years 4 months ago
A Java-based simulation manager for web-based simulation
This paper discusses a Web-based simulation manager program that executes an Application Service Provider (ASP) event for a customer who does not possess the inhouse capability to...
Charles Marr, Christopher Storey, William E. Biles...
IJSN
2006
78views more  IJSN 2006»
15 years 3 months ago
An approach to synthesise safe systems
: Detectors are system components that identify whether the system is in a particular state. Detectors can be used to ensure arbitrary safety properties for systems, that is, they ...
Arshad Jhumka, Felix C. Freiling, Christof Fetzer,...
ICST
2010
IEEE
15 years 1 months ago
(Un-)Covering Equivalent Mutants
—Mutation testing measures the adequacy of a test suite by seeding artificial defects (mutations) into a program. If a test suite fails to detect a mutation, it may also fail to...
David Schuler, Andreas Zeller
INFOCOM
2010
IEEE
15 years 1 months ago
Distributed Caching Algorithms for Content Distribution Networks
—The delivery of video content is expected to gain huge momentum, fueled by the popularity of user-generated clips, growth of VoD libraries, and wide-spread deployment of IPTV se...
Sem C. Borst, Varun Gupta, Anwar Walid
RV
2010
Springer
127views Hardware» more  RV 2010»
15 years 1 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone