Sciweavers

241 search results - page 41 / 49
» Design by Contract Using Meta-Assertions
Sort
View
STOC
2007
ACM
100views Algorithms» more  STOC 2007»
14 years 7 months ago
Reordering buffers for general metric spaces
In the reordering buffer problem, we are given an input sequence of requests for service each of which corresponds to a point in a metric space. The cost of serving the requests h...
Matthias Englert, Harald Räcke, Matthias West...
ICWS
2009
IEEE
14 years 4 months ago
Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents
: © Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents Chris Connelly, Brian Cox, Tim Forell, Rui Liu, Dejan Milojicic, Alan...
Chris Connelly, Brian Cox, Tim Forell, Rui Liu, De...
SACMAT
2009
ACM
14 years 2 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
CODES
2005
IEEE
14 years 1 months ago
Aggregating processor free time for energy reduction
Even after carefully tuning the memory characteristics to the application properties and the processor speed, during the execution of real applications there are times when the pr...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
PLDI
2005
ACM
14 years 1 months ago
Scalable statistical bug isolation
We present a statistical debugging algorithm that isolates bugs in programs containing multiple undiagnosed bugs. Earlier statistical algorithms that focus solely on identifying p...
Ben Liblit, Mayur Naik, Alice X. Zheng, Alexander ...