Sciweavers

17789 search results - page 179 / 3558
» Exceptional Use Cases
Sort
View
AICT
2007
IEEE
149views Communications» more  AICT 2007»
15 years 4 months ago
The Google Muni Wifi Network--Can it Compete with Cellular Voice?
Muni WiFi deployments have been widely covered by the media during the last two years. However, the economical feasibility and performance of such deployments as an alternative fo...
Andres Arjona, Sami Takala
129
Voted
JAR
2006
99views more  JAR 2006»
15 years 3 months ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...
CORR
2002
Springer
187views Education» more  CORR 2002»
15 years 3 months ago
Answer Sets for Consistent Query Answering in Inconsistent Databases
A relational database is inconsistent if it does not satisfy a given set of integrity constraints. Nevertheless, it is likely that most of the data in it is consistent with the co...
Marcelo Arenas, Leopoldo E. Bertossi, Jan Chomicki
WCRE
2010
IEEE
15 years 2 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...
CGI
1999
IEEE
15 years 8 months ago
Evolutionary Optimization of Functionally Defined Shapes: Case Study of Natural Optical Objects
This paper focuses on an approach to modeling shapes through the use of evolutionary optimization or genetic algorithms for functionally represented geometric objects. This repres...
Vladimir V. Savchenko, Alexander A. Pasko