Sciweavers

208 search results - page 26 / 42
» Performance evaluation and model checking join forces
Sort
View
AMAI
2010
Springer
13 years 5 months ago
Efficient approximate verification of B and Z models via symmetry markers
Abstract We present a new approximate verification technique for falsifying the invariants of B models. The technique employs symmetry of B models induced by the use of deferred se...
Michael Leuschel, Thierry Massart
INFORMATICALT
2008
122views more  INFORMATICALT 2008»
13 years 7 months ago
Modeling Phone Duration of Lithuanian by Classification and Regression Trees, using Very Large Speech Corpus
Classification and regression tree approach was used in this research to model phone duration of Lithuanian. 300 thousand samples of vowels and 400 thousand samples of consonants e...
Giedrius Norkevicius, Gailius Raskinis
JSA
2006
81views more  JSA 2006»
13 years 7 months ago
Deferred locking with shadow transaction for client-server DBMSs
Data-shipping systems that allow inter-transaction caching raise the need of a transactional cache consistency maintenance (CCM) protocol because each client is able to cache a po...
Hyeokmin Kwon, Songchun Moon
ASPLOS
2012
ACM
12 years 3 months ago
Providing safe, user space access to fast, solid state disks
Emerging fast, non-volatile memories (e.g., phase change memories, spin-torque MRAMs, and the memristor) reduce storage access latencies by an order of magnitude compared to state...
Adrian M. Caulfield, Todor I. Mollov, Louis Alex E...
KBSE
2007
IEEE
14 years 1 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer