Sciweavers

4350 search results - page 174 / 870
» Case studies for contract-based systems
Sort
View
TSE
2008
165views more  TSE 2008»
15 years 4 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 10 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...
MM
2006
ACM
168views Multimedia» more  MM 2006»
15 years 10 months ago
Scalability of local image descriptors: a comparative study
Computer vision researchers have recently proposed several local descriptor schemes. Due to lack of database support, however, these descriptors have only been evaluated using sma...
Herwig Lejsek, Friðrik Heiðar Ásmun...
NSDI
2008
15 years 6 months ago
Studying Black Holes in the Internet with Hubble
We present Hubble, a system that operates continuously to find Internet reachability problems in which routes exist to a destination but packets are unable to reach the destinatio...
Ethan Katz-Bassett, Harsha V. Madhyastha, John P. ...
FAC
2008
80views more  FAC 2008»
15 years 4 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...