Sciweavers

5344 search results - page 193 / 1069
» Privacy-Preserving Set Operations
Sort
View
NOMS
2008
IEEE
112views Communications» more  NOMS 2008»
15 years 10 months ago
CyberPlanner: A comprehensive toolkit for network service providers
—With the increased network size and diversity, and the proliferation in applications and services, the network service providers are faced with a flood of information from many...
Raouf Boutaba, Jin Xiao, Issam Aib
AGILEDC
2007
IEEE
15 years 9 months ago
Automated Recognition of Test-Driven Development with Zorro
Zorro is a system designed to automatically determine whether a developer is complying with an operational definition of Test-Driven Development (TDD) practices. Automated recogn...
Philip M. Johnson, Hongbing Kou
107
Voted
GECCO
2007
Springer
185views Optimization» more  GECCO 2007»
15 years 9 months ago
Enhanced forma analysis of permutation problems
Forma analysis provides an approach to formally derive domain specific operators based on domain-independent operator templates by manipulating a set of equivalence relations (i....
Tao Gong, Andrew Tuson
178
Voted
JSAI
2007
Springer
15 years 9 months ago
Towards a Logical Reconstruction of CF-Induction
CF-induction is a sound and complete hypothesis finding procedure for full clausal logic which uses the principle of inverse entailment to compute a hypothesis that logically expl...
Yoshitaka Yamamoto, Oliver Ray, Katsumi Inoue
LFCS
2007
Springer
15 years 9 months ago
A Decidable Temporal Logic of Repeating Values
Various logical formalisms with the freeze quantifier have been recently considered to model computer systems even though this is a powerful mechanism that often leads to undecida...
Stéphane Demri, Deepak D'Souza, Régi...