Sciweavers

1226 search results - page 150 / 246
» Generating Abstractions from Static Domain Analysis
Sort
View
CEC
2007
IEEE
14 years 2 months ago
Fingerprint analysis of the noisy prisoner's dilemma
Abstract— Fingerprinting is a technique that permits automatic classification of strategies for playing a game. In this study the evolution of strategies for playing the iterate...
Daniel A. Ashlock, Eun-Youn Kim, Wendy Ashlock
ICSE
2007
IEEE-ACM
14 years 8 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
EUROMICRO
2007
IEEE
14 years 2 months ago
Partial Verification of Software Components: Heuristics for Environment Construction
Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single compon...
Pavel Parizek, Frantisek Plasil
MIDDLEWARE
2004
Springer
14 years 1 months ago
Interoperability Among Independently Evolving Web Services
The increasing popularity of XML Web services motivates us to examine if it is feasible to substitute one vendor service for another when using a Web-based application, assuming th...
Shankar Ponnekanti, Armando Fox
DPD
2010
158views more  DPD 2010»
13 years 5 months ago
DYFRAM: dynamic fragmentation and replica management in distributed database systems
In distributed database systems, tables are frequently fragmented and replicated over a number of sites in order to reduce network communication costs. How to fragment, when to rep...
Jon Olav Hauglid, Norvald H. Ryeng, Kjetil N&oslas...