Sciweavers

3792 search results - page 130 / 759
» Techniques for Trusted Software Engineering
Sort
View
114
Voted
SAC
2009
ACM
15 years 10 months ago
A comparative study of techniques to write customizable libraries
Code libraries are characterized by feature-richness — and, consequently, high overhead. The library specialization problem is the problem of obtaining a low-overhead version of...
Baris Aktemur, Sam Kamin
114
Voted
TCAD
2010
102views more  TCAD 2010»
14 years 10 months ago
Functional Test Generation Using Efficient Property Clustering and Learning Techniques
Abstract--Functional verification is one of the major bottlenecks in system-on-chip design due to the combined effects of increasing complexity and lack of automated techniques for...
Mingsong Chen, Prabhat Mishra
146
Voted
ISORC
2006
IEEE
15 years 9 months ago
Load Balancing Techniques for Distributed Stream Processing Applications in Overlay Environments
Service overlays that support distributed stream processing applications are increasingly being deployed in wide-area environments. The inherent heterogeneous, dynamic and large-s...
Yannis Drougas, Thomas Repantis, Vana Kalogeraki
124
Voted
ER
1995
Springer
109views Database» more  ER 1995»
15 years 7 months ago
Reverse Engineering of Relational Database Applications
Abstract. This paper presents techniques for reverse engineering of relational database applications. The target of such an effort is the definition of a fully equipped object-orie...
Mark W. W. Vermeer, Peter M. G. Apers
127
Voted
COLING
2000
15 years 5 months ago
The Use of Instrumentation in Grammar Engineering
This paper explores the usefltllmss of a technique from software engineering, (:ode instrumentation, tbr the developlnent of large-scale natural language grammars, hltbrlnation ab...
Norbert Bröker