Sciweavers

661 search results - page 41 / 133
» What Can We Expect from Program Verification
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
WCRE
2006
IEEE
14 years 2 months ago
An Industrial Case Study of Program Artifacts Viewed During Maintenance Tasks
Research on maintenance task structure modeling has so far examined only how often program artifacts are modified, and what information can be deduced from modification records....
Lijie Zou, Michael W. Godfrey
DICTA
2003
13 years 10 months ago
Extracting Boundaries from Images by Comparing Cooccurrence Matrices
Abstract. This paper describes methods of extracting region boundaries from the frames of an image sequence by combining information from spatial or temporal cooccurrence matrices ...
Astrit Rexhepi, Azriel Rosenfeld
TSC
2010
159views more  TSC 2010»
13 years 3 months ago
A Mathematical Programming Approach for Server Consolidation Problems in Virtualized Data Centers
Today's data centers offer IT services mostly hosted on dedicated physical servers. Server virtualization provides a technical means for server consolidation. Thus, multiple v...
Benjamin Speitkamp, Martin Bichler
VL
2010
IEEE
216views Visual Languages» more  VL 2010»
13 years 7 months ago
Explanatory Debugging: Supporting End-User Debugging of Machine-Learned Programs
Many machine-learning algorithms learn rules of behavior from individual end users, such as taskoriented desktop organizers and handwriting recognizers. These rules form a “prog...
Todd Kulesza, Simone Stumpf, Margaret M. Burnett, ...