Sciweavers

813 search results - page 48 / 163
» Pipeline-centric provenance model
Sort
View
IEEEIAS
2008
IEEE
14 years 3 months ago
LoSS Detection Approach Based on ESOSS and ASOSS Models
This paper investigates Loss of Self-similarity (LoSS) detection performance using Exact and Asymptotic Second Order Self-Similarity (ESOSS and ASOSS) models. Previous works on Lo...
Mohd Fo'ad Rohani, Mohd Aizaini Maarof, Ali Selama...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
14 years 3 months ago
A Preliminary Model for Generating Experience Knowledge Based Artifacts
Inspections provide an effective way of acquiring and reusing experience knowledge. Several details, in both the inspection processes and the inspection event itself, can be found...
Jouni Kokkoniemi
CAV
2001
Springer
121views Hardware» more  CAV 2001»
14 years 1 months ago
A Practical Approach to Coverage in Model Checking
In formal verification, we verify that a system is correct with respect to a specification. When verification succeeds and the system is proven to be correct, there is still a q...
Hana Chockler, Orna Kupferman, Robert P. Kurshan, ...
ISSRE
2000
IEEE
14 years 1 months ago
Can Intuition Become Rigorous? Foundations for UML Model Verification Tools
The Unified Modeling Language, UML, is the objectoriented notation adopted as the standard for objectoriented Analysis and Design by the Object Management Group. This paper report...
José Luis Fernández Alemán, J...
ISLPED
1999
ACM
236views Hardware» more  ISLPED 1999»
14 years 1 months ago
Modeling and automating selection of guarding techniques for datapath elements
While guarded evaluation has proven an effective energy saving technique in arithmetic circuits, good methodologies do not exist for determining when and how to guard for maximal ...
William E. Dougherty, Donald E. Thomas