Sciweavers

1036 search results - page 187 / 208
» Verification Programs for Abduction
Sort
View
SIGMOD
2007
ACM
158views Database» more  SIGMOD 2007»
16 years 4 months ago
Log-based recovery for middleware servers
We have developed new methods for log-based recovery for middleware servers which involve thread pooling, private inmemory states for clients, shared in-memory state and message i...
Rui Wang 0002, Betty Salzberg, David B. Lomet
ICSE
2004
IEEE-ACM
16 years 4 months ago
Imposing a Memory Management Discipline on Software Deployment
The deployment of software components frequently fails because dependencies on other components are not declared explicitly or are declared imprecisely. This results in an incompl...
Eelco Dolstra, Eelco Visser, Merijn de Jonge
ISESE
2006
IEEE
15 years 10 months ago
An empirical evaluation of a testing and debugging methodology for Excel
Spreadsheets are one of the most commonly used types of programs in the world, and it is important that they be sufficiently dependable. To help end users who create spreadsheets ...
Jeffrey Carver, Marc Fisher II, Gregg Rothermel
ACMSE
2006
ACM
15 years 10 months ago
Automatic support for testing web-based enterprise applications
In this paper we consider the problem of automatically generating test suites associated with web-based enterprise systems. In particular, we discuss the construction of a tool de...
Arturo Sanchez, Brandon Vega, Alexander Gonzalez, ...
CODES
2005
IEEE
15 years 10 months ago
The design of a smart imaging core for automotive and consumer applications: a case study
This paper describes the design of a low-cost, low-power smart imaging core that can be embedded in cameras. The core integrates an ARM 9 processor, a camera interface and two spe...
Wido Kruijtzer, Winfried Gehrke, Víctor Rey...