Sciweavers

1613 search results - page 82 / 323
» Model-Driven Constraint Engineering
Sort
View
124
Voted
AMAST
2004
Springer
15 years 8 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
163
Voted
CCECE
2006
IEEE
15 years 9 months ago
New Constraints on Generation of Uniform Random Samples from Evolutionary Trees
In this paper, we introduce new algorithms for selecting taxon samples from large evolutionary trees, maintaining uniformity and randomness, under certain new constraints on the t...
Anupam Bhattacharjee, Zalia Shams, Kazi Zakia Sult...
119
Voted
CSMR
2005
IEEE
15 years 9 months ago
Tracing Cross-Cutting Requirements via Context-Based Constraints
In complex systems, it is difficult to identify which system element is involved in which requirement. In this article, we present a new approach for expressing and validating a ...
Felix Bübl, Michael Balser
126
Voted
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
15 years 1 months ago
Argumentation Based Constraint Acquisition
Efficient acquisition of constraint networks is a key factor for the applicability of constraint problem solving methods. Current techniques ease knowledge acquisition by generati...
Kostyantyn M. Shchekotykhin, Gerhard Friedrich
170
Voted
ICST
2009
IEEE
15 years 1 months ago
Euclide: A Constraint-Based Testing Framework for Critical C Programs
Euclide is a new Constraint-Based Testing tool for verifying safety-critical C programs. By using a mixture of symbolic and numerical analyses (namely static single assignment for...
Arnaud Gotlieb