Sciweavers

3639 search results - page 626 / 728
» Provenance as Dependency Analysis
Sort
View
REFSQ
2010
Springer
14 years 7 months ago
Towards a Framework for Specifying Software Robustness Requirements Based on Patterns
Abstract. [Context and motivation] With increasing use of software, quality attributes grow in relative importance. Robustness is a software quality attribute that has not received...
Ali Shahrokni, Robert Feldt
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
14 years 7 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
CLEF
2009
Springer
14 years 7 months ago
Medical Image Retrieval: ISSR at CLEF 2009
This paper represents the first participation of the Institute of Statistical Studies and Research at Cairo University group in CLEF 2009-Medical image retrieval track. Our system...
Waleed Arafa, Ragia Ibrahim
ECRTS
2009
IEEE
14 years 7 months ago
Using Randomized Caches in Probabilistic Real-Time Systems
While hardware caches are generally effective at improving application performance, they greatly complicate performance prediction. Slight changes in memory layout or data access p...
Eduardo Quiñones, Emery D. Berger, Guillem ...
78
Voted
EDM
2009
116views Data Mining» more  EDM 2009»
14 years 7 months ago
Dimensions of Difficulty in Translating Natural Language into First-Order Logic
In this paper, we present a study of a large corpus of student logic exercises in which we explore the relationship between two distinct measures of difficulty: the proportion of s...
Dave Barker-Plummer, Richard Cox, Robert Dale