Sciweavers

489 search results - page 49 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
130
Voted
SIGMETRICS
2010
ACM
180views Hardware» more  SIGMETRICS 2010»
14 years 11 months ago
Route oracle: where have all the packets gone?
Many network-management problems in large backbone networks need the answer to a seemingly simple question: where does a given IP packet, entering the network at a particular plac...
Yaping Zhu, Jennifer Rexford, Subhabrata Sen, Aman...
80
Voted
RE
1995
Springer
15 years 4 months ago
Managing inconsistencies in an evolving specification
In an evolving specification, considerable development time and effort is spent handling recurrent inconsistencies. Tools and techniques for detecting and resolving inconsistencie...
Steve M. Easterbrook, Bashar Nuseibeh
113
Voted
ADAEUROPE
2003
Springer
15 years 5 months ago
Charles: A Data Structure Library for Ada95
ontainer. In particular, an iterator abstracts away differences in specific container types, allowing you to view the collection simply as a sequence of items. A generic algorith...
Matthew Heaney
SIGSOFT
2005
ACM
16 years 1 months ago
Strathcona example recommendation tool
Using the application programming interfaces (API) of large software systems requires developers to understand details about the interfaces that are often not explicitly defined. ...
Reid Holmes, Robert J. Walker, Gail C. Murphy
KR
2004
Springer
15 years 5 months ago
Inferential Complexity Control for Model-Based Abduction
We describe a technique for speeding up inference for model-based abduction tasks that trades off inference time and/or space for the fraction of queries correctly answered. We co...
Gregory M. Provan