Sciweavers

605 search results - page 84 / 121
» A strategy for efficiently verifying requirements
Sort
View
KDD
2008
ACM
104views Data Mining» more  KDD 2008»
14 years 9 months ago
Succinct summarization of transactional databases: an overlapped hyperrectangle scheme
Transactional data are ubiquitous. Several methods, including frequent itemsets mining and co-clustering, have been proposed to analyze transactional databases. In this work, we p...
Yang Xiang, Ruoming Jin, David Fuhry, Feodor F. Dr...
CHI
2007
ACM
14 years 9 months ago
Design and comparison of acceleration methods for touchpad
As the resolution of a notebook display increases, the efficiency of a touchpad is becoming a more important issue. In particular, it is often observed that users scrape the pad r...
Sumi Yun, Geehyuk Lee
SIGMOD
2003
ACM
115views Database» more  SIGMOD 2003»
14 years 9 months ago
Querying Structured Text in an XML Database
XML databases often contain documents comprising structured text. Therefore, it is important to integrate "information retrieval style" query evaluation, which is well-s...
Shurug Al-Khalifa, Cong Yu, H. V. Jagadish
ISESE
2003
IEEE
14 years 2 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...
DAC
1994
ACM
14 years 1 months ago
Dynamic Search-Space Pruning Techniques in Path Sensitization
A powerful combinational path sensitization engine is required for the efficient implementation of tools for test pattern generation, timing analysis, and delay fault testing. Path...
João P. Marques Silva, Karem A. Sakallah