Sciweavers

1638 search results - page 306 / 328
» Properties of input-consuming derivations
Sort
View
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
15 years 2 months ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
IPPS
2000
IEEE
15 years 2 months ago
FANTOMAS: Fault Tolerance for Mobile Agents in Clusters
Abstract. To achieve an efficient utilization of cluster systems, a proper programming and operating environment is required. In this context, mobile agents are of growing interes...
Holger Pals, Stefan Petri, Claus Grewe
TOOLS
2000
IEEE
15 years 2 months ago
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification
This paper presents a method and a tool for building trustable OO components. The methodology is based on an integrated design and test approach for OO software components. It is ...
Benoit Baudry, Vu Le Hanh, Yves Le Traon
ISSTA
2000
ACM
15 years 2 months ago
Classification schemes to aid in the analysis of real-time systems
This paper presents three sets of classification schemes for processes, properties, and transitions that can be used to assist in the analysis of real-time systems. These classifi...
Paul Z. Kolano, Richard A. Kemmerer
SIGIR
1999
ACM
15 years 2 months ago
Summarizing Text Documents: Sentence Selection and Evaluation Metrics
Human-quality text summarization systems are di cult to design, and even more di cult to evaluate, in part because documents can di er along several dimensions, such as length, wri...
Jade Goldstein, Mark Kantrowitz, Vibhu O. Mittal, ...