Sciweavers

5506 search results - page 984 / 1102
» Visualizing Software Changes
Sort
View
115
Voted
CCGRID
2001
IEEE
15 years 6 months ago
NwsAlarm: A Tool for Accurately Detecting Resource Performance Degradation
End-users of high-performance computing resources have come to expect that consistent levels of performance be delivered to their applications. The advancement of the Computationa...
Chandra Krintz, Richard Wolski
131
Voted
GECCO
2010
Springer
163views Optimization» more  GECCO 2010»
15 years 6 months ago
Factors affecting the use of genetic algorithms in test suite augmentation
Test suite augmentation techniques are used in regression testing to help engineers identify code elements affected by changes, and generate test cases to cover those elements. R...
Zhihong Xu, Myra B. Cohen, Gregg Rothermel
138
Voted
ACMSE
1995
ACM
15 years 6 months ago
Database management for multimedia distributed collaborative writing
{ Traditional computer applications have been designed to be run by one user at a time who does some work in a single medium, such as ASCII text, and very little regard has been gi...
A. Wesley Wear, Yu Gong, Kai H. Chang
113
Voted
MOBICOM
1997
ACM
15 years 6 months ago
Web Browsing in a Wireless Environment: Disconnected and Asynchronous Operation in ARTour Web Express
In a previous paper [elided], we described ARTour Web Express, a software system that makes it possible to run World Wide Web applications over wide-area wireless networks. Our ea...
Henry Chang, Carl D. Tait, Norman H. Cohen, Moshe ...
131
Voted
ASIACRYPT
2009
Springer
15 years 6 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...