Sciweavers

257 search results - page 39 / 52
» Packet-Based Input Test Data Compression Techniques
Sort
View
FORTE
2008
13 years 8 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
14 years 29 days ago
Mining Complex Patterns from Protein Surfaces
In the domain of bioinformatics, the role played in the biological process by proteins, that act as transmitters and receivers of information thus ruling the mechanisms that deter...
Lorenzo Baldacci, Matteo Golfarelli
DOLAP
2007
ACM
13 years 11 months ago
Deciding the physical implementation of ETL workflows
In this paper, we deal with the problem of determining the best possible physical implementation of an ETL workflow, given its logical-level description and an appropriate cost mo...
Vasiliki Tziovara, Panos Vassiliadis, Alkis Simits...
ERLANG
2004
ACM
14 years 24 days ago
Structured programming using processes
Structured Programming techniques are applied to a personal accounting software application implemented in erlang as a demonstration of the utility of processes as design construc...
Jay Nelson
SYSTOR
2009
ACM
14 years 1 months ago
The effectiveness of deduplication on virtual machine disk images
Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. While th...
Keren Jin, Ethan L. Miller