Sciweavers

5344 search results - page 165 / 1069
» Privacy-Preserving Set Operations
Sort
View
107
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Test selection for result inspection via mining predicate rules
It is labor-intensive to manually verify the outputs of a large set of tests that are not equipped with test oracles. Test selection helps to reduce this cost by selecting a small...
Wujie Zheng, Michael R. Lyu, Tao Xie
134
Voted
ICCTA
2007
IEEE
15 years 9 months ago
Partially Dynamic Concurrent Update of Distributed Shortest Paths
We study the dynamic version of the distributed all-pairs shortest paths problem. Most of the solutions given in the literature for this problem work under the assumption that bef...
Gianlorenzo D'Angelo, Serafino Cicerone, Gabriele ...
NMR
2004
Springer
15 years 8 months ago
Semantics of disjunctive programs with monotone aggregates - an operator-based approach
All major semantics of normal logic programs and normal logic programs with aggregates can be described as fixpoints of the one-step provability operator or of operators that can...
Nikolay Pelov, Miroslaw Truszczynski
COOPIS
2003
IEEE
15 years 8 months ago
The Semantics of the Compound Term Composition Algebra
Abstract. In [11], we proposed an algebra with four algebraic operators, whose composition can be used to generate valid compound terms in a given faceted taxonomy in an efficient ...
Yannis Tzitzikas, Anastasia Analyti, Nicolas Spyra...
EMSOFT
2007
Springer
15 years 9 months ago
The algebra of connectors: structuring interaction in BIP
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...
Simon Bliudze, Joseph Sifakis