As silicon process technology scales deeper into the nanometer regime, hardware defects are becoming more common. Such defects are bound to hinder the correct operation of future ...
Kypros Constantinides, Onur Mutlu, Todd M. Austin,...
The Cranfield evaluation method has some disadvantages, including its high cost in labor and inadequacy for evaluating interactive retrieval techniques. As a very promising alter...
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Assertions, or more generally “Programming by contract”, have gained widespread acceptance in the computer science community as a means for correct program development. Howeve...
In this year’s participation we continued to evaluate open source information retrieval software. We used mainly the system Lucene and experimented with some of the most effecti...