Sciweavers

1528 search results - page 183 / 306
» Performance Assertion Checking
Sort
View
EDCC
2006
Springer
15 years 6 months ago
Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware
- This paper proposes a novel technique for preventing a wide range of data errors from corrupting the execution of applications. The proposed technique enables automated derivatio...
Karthik Pattabiraman, Giacinto Paolo Saggese, Dani...
ESCIENCE
2006
IEEE
15 years 6 months ago
A Collaborative Virtual Computer Security Lab
The necessity of a lab course on computer security arises from the students' need to complement course work by hands-on experience. In order to meet the distance teaching dem...
Jörg Keller, Ralf Naues
KDD
1995
ACM
248views Data Mining» more  KDD 1995»
15 years 6 months ago
Data Mining for Loan Evaluation at ABN AMRO: A Case Study
Wedescribe a case study in data miningfor personal loan evaluation, performed at the ABNAMRObank in the Netherlands. Historical data of clients and their pay-backbehaviourare used...
A. J. Feelders, A. J. F. le Loux, J. W. van't Zand
ISSTA
1991
ACM
15 years 6 months ago
Dynamic Slicing in the Presence of Unconstrained Pointers
Program slices are useful in debugging. Most work on program slicing to date has concentrated on nding slices of programs involving only scalar variables. Pointers and composite v...
Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spa...
CAISE
2006
Springer
15 years 4 months ago
Incremental Evaluation of OCL Constraints
: Integrity checking is aimed at determining whether an operation execution violates a given integrity constraint. To perform this computation efficiently, several incremental meth...
Jordi Cabot, Ernest Teniente