Sciweavers

1222 search results - page 160 / 245
» Verifying a File System Implementation
Sort
View
112
Voted
WWW
2005
ACM
16 years 3 months ago
Design for verification for asynchronously communicating Web services
We present a design for verification approach to developing reliable web services. We focus on composite web services which consist of asynchronously communicating peers. Our goal...
Aysu Betin-Can, Tevfik Bultan, Xiang Fu
138
Voted
DAC
2002
ACM
16 years 3 months ago
Software synthesis from synchronous specifications using logic simulation techniques
This paper addresses the problem of automatic generation of implementation software from high-level functional specifications in the context of embedded system on chip designs. So...
Yunjian Jiang, Robert K. Brayton
100
Voted
HICSS
2007
IEEE
136views Biometrics» more  HICSS 2007»
15 years 8 months ago
Analog and Hybrid Computation Approaches for Static Power Flow
Analog and hybrid computation methods are areas of continued interest, particularly in specific applications where traditional digital computation techniques cannot achieve the de...
Aaron St. Leger, Chika O. Nwankpa
164
Voted
KDD
2008
ACM
274views Data Mining» more  KDD 2008»
16 years 2 months ago
Data mining using high performance data clouds: experimental studies using sector and sphere
We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastruc...
Robert L. Grossman, Yunhong Gu
105
Voted
ICSE
2009
IEEE-ACM
15 years 9 months ago
Automated substring hole analysis
Code coverage is a common measure for quantitatively assessing the quality of software testing. Code coverage indicates the fraction of code that is actually executed by tests in ...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...