Sciweavers

2584 search results - page 453 / 517
» On the Forward Checking Algorithm
Sort
View
TOSEM
2002
153views more  TOSEM 2002»
13 years 8 months ago
Automated abstraction of class diagrams
d Abstraction of Class Diagrams ALEXANDER EGYED Teknowledge Corporation Designers can easily become overwhelmed with details when dealing with large class diagrams. icle presents a...
Alexander Egyed
KBSE
2010
IEEE
13 years 7 months ago
An automated approach for finding variable-constant pairing bugs
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Julia L. Lawall, David Lo
PVLDB
2010
105views more  PVLDB 2010»
13 years 7 months ago
Destabilizers and Independence of XML Updates
Independence analysis is the problem of determining whether an update affects the result of a query, e.g. a constraint or materialized view. We develop a new, modular framework fo...
Michael Benedikt, James Cheney
TPDS
2010
143views more  TPDS 2010»
13 years 7 months ago
FIT: A Flexible, Lightweight, and Real-Time Scheduling System for Wireless Sensor Platforms
—We propose FIT, a flexible, lightweight, and real-time scheduling system for wireless sensor platforms. There are three salient features of FIT. First, its two-tier hierarchical...
Wei Dong, Chun Chen, Xue Liu, Kougen Zheng, Rui Ch...
EMNLP
2010
13 years 7 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark