Sciweavers

15811 search results - page 3078 / 3163
» Search-based software engineering
Sort
View
POPL
2011
ACM
14 years 3 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen
CCS
2011
ACM
14 years 20 days ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
AAAI
2008
15 years 3 months ago
Query-URL Bipartite Based Approach to Personalized Query Recommendation
Query recommendation is considered an effective assistant in enhancing keyword based queries in search engines and Web search software. Conventional approach to query recommendati...
Lin Li, Zhenglu Yang, Ling Liu, Masaru Kitsuregawa
134
Voted
EUROSYS
2006
ACM
15 years 9 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
115
Voted
EUROSYS
2006
ACM
15 years 6 months ago
K42: building a complete operating system
K42 is one of the few recent research projects that is examining operating system design structure issues in the context of new whole-system design. K42 is open source and was des...
Orran Krieger, Marc A. Auslander, Bryan S. Rosenbu...
« Prev « First page 3078 / 3163 Last » Next »