Sciweavers

2205 search results - page 380 / 441
» Mutation Operators for Specifications
Sort
View
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 12 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
SNPD
2008
13 years 11 months ago
An Approach to Modeling Software Safety
: Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. Software safety is a co...
M. Ben Swarup, P. Seetha Ramaiah
APCCM
2006
13 years 11 months ago
Defining and implementing domains with multiple types using mesodata modelling techniques
The integration of data from different sources often leads to the adoption of schemata that entail a loss of information in respect of one or more of the data sets being combined....
Sally Rice, John F. Roddick, Denise de Vries
FLAIRS
2004
13 years 11 months ago
Satisfying Varying Retrieval Requirements in Case Based Intelligent Directory Assistance
Intelligent directory assistance is the ability to retrieve relevant subscriber records in the presence of mismatches between the query and the subscriber record. The challenges a...
Vivek Balaraman, Sutanu Chakraborti
USENIX
2004
13 years 11 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...