Sciweavers

434 search results - page 57 / 87
» Detection and correction of design defects in object-oriente...
Sort
View
ATAL
2006
Springer
13 years 11 months ago
Accident or intention: that is the question (in the Noisy Iterated Prisoner's Dilemma)
This paper focuses on the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "coop...
Tsz-Chiu Au, Dana S. Nau
IJSN
2008
147views more  IJSN 2008»
13 years 7 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
ICST
2009
IEEE
14 years 2 months ago
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
It is challenging to test applications and functions for which the correct output for arbitrary input cannot be known in advance, e.g. some computational science or machine learni...
Christian Murphy, Kuang Shen, Gail E. Kaiser
BMCBI
2007
136views more  BMCBI 2007»
13 years 7 months ago
Comparison of protein structures by growing neighborhood alignments
Background: Design of protein structure comparison algorithm is an important research issue, having far reaching implications. In this article, we describe a protein structure com...
Sourangshu Bhattacharya, Chiranjib Bhattacharyya, ...
SC
2009
ACM
14 years 2 months ago
Flexible cache error protection using an ECC FIFO
We present ECC FIFO, a mechanism enabling two-tiered last-level cache error protection using an arbitrarily strong tier-2 code without increasing on-chip storage. Instead of addin...
Doe Hyun Yoon, Mattan Erez