Sciweavers

6978 search results - page 1245 / 1396
» On Proofs in System P
Sort
View
ISSTA
2006
ACM
14 years 3 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
SBCCI
2006
ACM
171views VLSI» more  SBCCI 2006»
14 years 3 months ago
Asynchronous circuit design on reconfigurable devices
This paper presents the design of asynchronous circuits on synchronous FPGAs and CPLDs. Different design styles have been investigated through the implementation of dual-rail full...
R. U. R. Mocho, G. H. Sartori, Renato P. Ribas, An...
SIGCSE
2006
ACM
127views Education» more  SIGCSE 2006»
14 years 3 months ago
SNITCH: a software tool for detecting cut and paste plagiarism
Plagiarism of material from the Internet is a widespread and growing problem. Computer science students, and those in other science and engineering courses, can sometimes get away...
Sebastian Niezgoda, Thomas P. Way
SIGCSE
2006
ACM
133views Education» more  SIGCSE 2006»
14 years 3 months ago
Student progress monitoring tool using treeview
In this paper, we present an extensible visualization tool that is being used in a web-based closed laboratory system. The goal of this project is to provide a tool for both stude...
Jungsoon P. Yoo, Sung K. Yoo, Chris Lance, Judy Ha...
SIGECOM
2006
ACM
128views ECommerce» more  SIGECOM 2006»
14 years 3 months ago
Controlling a supply chain agent using value-based decomposition
We present and evaluate the design of Deep Maize, our entry in the 2005 Trading Agent Competition Supply Chain Management scenario. The central idea is to decompose the problem by...
Christopher Kiekintveld, Jason Miller, Patrick R. ...
« Prev « First page 1245 / 1396 Last » Next »