Sciweavers

514 search results - page 79 / 103
» Dependency Analysis of Ada Programs
Sort
View
SCAM
2006
IEEE
14 years 1 months ago
Stop-List Slicing
Traditional program slicing requires two parameters: a program location and a variable, or perhaps a set of variables, of interest. Stop-list slicing adds a third parameter to the...
Keith Gallagher, David Binkley, Mark Harman
VLSID
2002
IEEE
130views VLSI» more  VLSID 2002»
14 years 7 months ago
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks
In preemptive real-time systems, a tighter estimate of the Worst Case Response Time(WCRT) of the tasks can be obtained if the layout of the tasks in memory is included in the esti...
Anupam Datta, Sidharth Choudhury, Anupam Basu
PKDD
2007
Springer
146views Data Mining» more  PKDD 2007»
14 years 1 months ago
A Method for Multi-relational Classification Using Single and Multi-feature Aggregation Functions
This paper presents a novel method for multi-relational classification via an aggregation-based Inductive Logic Programming (ILP) approach. We extend the classical ILP representati...
Richard Frank, Flavia Moser, Martin Ester
QSIC
2005
IEEE
14 years 28 days ago
Proving the Safety of SQL Queries
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
Stefan Brass, Christian Goldberg
IFIP
2004
Springer
14 years 21 days ago
BER Estimation for HiperLAN/2
This paper presents a method to estimate the bit error rate (BER) of the wireless channel based on statistical analysis of the soft output of the receiver only. In HiperLAN/2 sever...
Lodewijk T. Smit, Gerard J. M. Smit, Johann Hurink...