Sciweavers

2015 search results - page 243 / 403
» Hidden Software Capabilities
Sort
View
PTS
2010
175views Hardware» more  PTS 2010»
13 years 7 months ago
Test Data Generation for Programs with Quantified First-Order Logic Specifications
We present a novel algorithm for test data generation that is based on techniques used in formal software verification. Prominent examples of such formal techniques are symbolic ex...
Christoph Gladisch
IJACTAICIT
2010
549views more  IJACTAICIT 2010»
13 years 7 months ago
Adding PC Connectivity to the MTS-88 Microcomputer Teaching System
The MTS-88.c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembl...
Omar Walid Abdul-Wahab, Wameedh Nazar Flayyih
COLING
2010
13 years 4 months ago
Detection of Simple Plagiarism in Computer Science Papers
Plagiarism is the use of the language and thoughts of another work and the representation of them as one's own original work. Various levels of plagiarism exist in many domai...
Yaakov HaCohen-Kerner, Aharon Tayeb, Natan Ben-Dro...
PRESENCE
2010
76views more  PRESENCE 2010»
13 years 4 months ago
Modularity for Large Virtual Reality Applications
This paper focuses on the design of high performance VR applications. These applications usually involve various I/O devices and complex simulations. A parallel architecture or gri...
Jérémie Allard, Jean-Denis Lesage, B...
SIGKDD
2010
101views more  SIGKDD 2010»
13 years 4 months ago
Unexpected results in online controlled experiments
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Ron Kohavi, Roger Longbotham