Sciweavers

11740 search results - page 158 / 2348
» More Problems in Rewriting
Sort
View
CIDR
2009
105views Algorithms» more  CIDR 2009»
15 years 5 months ago
Teaching an Old Elephant New Tricks
In recent years, column stores (or C-stores for short) have emerged as a novel approach to deal with read-mostly data warehousing applications. Experimental evidence suggests that...
Nicolas Bruno
EUROPAR
2010
Springer
15 years 5 months ago
Profile-Driven Selective Program Loading
Abstract. Complex software systems use many shared libraries frequently composed of large off-the-shelf components. Only a limited number of functions are used from these shared li...
Tugrul Ince, Jeffrey K. Hollingsworth
GG
2008
Springer
15 years 5 months ago
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts
Behavior preservation, namely the fact that the behavior of a model is not altered by the transformations, is a crucial property in refactoring. The most common approaches to behav...
Guilherme Rangel, Leen Lambers, Barbara König...
153
Voted
IJAIT
2006
106views more  IJAIT 2006»
15 years 4 months ago
An Empirical Evaluation of Automated Theorem Provers in Software Certification
We describe a system for the automated certification of safety properties of NASA software. The system uses Hoare-style program verification technology to generate proof obligatio...
Ewen Denney, Bernd Fischer 0002, Johann Schumann
TCS
2002
15 years 3 months ago
Relating CASL with other specification languages: the institution level
In this work, we investigate various specification languages and their relation to Casl, the recently developed Common Algebraic Specification Language. In particular, we consider...
Till Mossakowski