Sciweavers

1282 search results - page 235 / 257
» Practical Loss-Resilient Codes
Sort
View
POPL
2002
ACM
16 years 3 months ago
Mining specifications
Program verification is a promising approach to improving program quality, because it can search all possible program executions for specific errors. However, the need to formally...
Glenn Ammons, James R. Larus, Rastislav Bodí...
127
Voted
CADE
2001
Springer
16 years 3 months ago
More On Implicit Syntax
Proof assistants based on type theories, such as Coq and Lego, allow users to omit subterms on input that can be inferred automatically. While those mechanisms are well known, ad-h...
Marko Luther
234
Voted
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 3 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
163
Voted
SIGMOD
2004
ACM
165views Database» more  SIGMOD 2004»
16 years 3 months ago
Industrial-Strength Schema Matching
Schema matching identifies elements of two given schemas that correspond to each other. Although there are many algorithms for schema matching, little has been written about build...
Philip A. Bernstein, Sergey Melnik, Michalis Petro...
155
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
Patterns, Frameworks, and Middleware: Their Synergistic Relationships
The knowledge required to develop complex software has historically existed in programming folklore, the heads of experienced developers, or buried deep in the code. These locatio...
Douglas C. Schmidt, Frank Buschmann