Sciweavers

2111 search results - page 271 / 423
» How to Program Pervasive Systems
Sort
View
ISSTA
2006
ACM
15 years 8 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
225
Voted
ASPLOS
2009
ACM
16 years 3 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
203
Voted
SIGMOD
2007
ACM
196views Database» more  SIGMOD 2007»
16 years 2 months ago
GPUQP: query co-processing using graphics processors
We present GPUQP, a relational query engine that employs both CPUs and GPUs (Graphics Processing Units) for in-memory query co-processing. GPUs are commodity processors traditiona...
Rui Fang, Bingsheng He, Mian Lu, Ke Yang, Naga K. ...
IFIP
2001
Springer
15 years 7 months ago
Translation, Betrayal and Ambiguity in IS Development
This paper uses semiotic theories to model how meaning is constructed during an IS development project. Conventionally, shared meanings among all project stakeholders are regarded...
Jim Underwood
173
Voted
ICFP
1997
ACM
15 years 6 months ago
Foundations for the Implementation of Higher-Order Subtyping
We show how to implement a calculus with higher-order subtyping and subkinding by replacing uses of implicit subsumption with explicit coercions. To ensure this can be done, a pol...
Karl Crary