Sciweavers

1045 search results - page 75 / 209
» The Use of Exceptions
Sort
View
SCAM
2007
IEEE
14 years 2 months ago
The Programmer's Lexicon, Volume I: The Verbs
ames make or break abstractions: good ones communicate the intention of the method, whereas bad ones cause confusion and frustration. The task of naming is subject to the whims an...
Einar W. Høst, Bjarte M. Østvold
TASE
2007
IEEE
14 years 2 months ago
Model Checking Networked Programs in the Presence of Transmission Failures
Software model checkers work directly on single-process programs, but not on multiple processes. Conversion of processes into threads, combined with a network model, allows for mo...
Cyrille Artho, Christian Sommer 0002, Shinichi Hon...
CP
2007
Springer
14 years 2 months ago
Propagation = Lazy Clause Generation
Finite domain propagation solvers effectively represent the possible values of variables by a set of choices which can be naturally modelled as Boolean variables. In this paper we...
Olga Ohrimenko, Peter J. Stuckey, Michael Codish
ISVC
2007
Springer
14 years 2 months ago
ChipViz : Visualizing Memory Chip Test Data
This paper presents a technique that allows test engineers to visually analyze and explore within memory chip test data. We represent the test results from a generation of chips al...
Amit P. Sawant, Ravi Raina, Christopher G. Healey
RULEML
2007
Springer
14 years 2 months ago
Specifying Process-Aware Access Control Rules in SBVR
Abstract. Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying bu...
Stijn Goedertier, Christophe Mues, Jan Vanthienen