Sciweavers

4193 search results - page 140 / 839
» Measurable Categories
Sort
View
JUCS
2008
90views more  JUCS 2008»
15 years 4 months ago
A Survey of Practical Software Adaptation Techniques
: Software adaptation techniques appear in many disparate areas of research literature, and under many guises. This paper enables a clear and uniform understanding of the related r...
Stephen Kell
SIGIR
2008
ACM
15 years 4 months ago
On document splitting in passage detection
Passages can be hidden within a text to circumvent their disallowed transfer. Such release of compartmentalized information is of concern to all corporate and governmental organiz...
Nazli Goharian, Saket S. R. Mengle
WWW
2007
ACM
16 years 5 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
DAC
2010
ACM
15 years 2 months ago
SCEMIT: a systemc error and mutation injection tool
As high-level models in C and SystemC are increasingly used for verification and even design (through high-level synthesis) of electronic systems, there is a growing need for com...
Peter Lisherness, Kwang-Ting (Tim) Cheng
SIGSOFT
2010
ACM
15 years 2 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf