Sciweavers

DICS
2006
13 years 9 months ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer
DICS
2006
13 years 9 months ago
Advances in the Design and Implementation of Group Communication Middleware
Abstract. Group communication is a programming abstraction that allows a distributed group of processes to provide a reliable service in spite of the possibility of failures within...
Daniel C. Bünzli, Rachele Fuzzati, Sergio Men...
DICS
2006
13 years 9 months ago
Definition and Correct Refinement of Operation Specifications
Abstract. Modern incremental and iterative software engineering processes advocate to build software systems by first creating a highly simpliabstract model of the system which is ...
Thomas Baar, Slavisa Markovic, Frédé...
ISSTA
2010
ACM
13 years 9 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
COMPSAC
2005
IEEE
13 years 9 months ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin
COMPSAC
2005
IEEE
13 years 9 months ago
Efficiently Managing Security Concerns in Component Based System Design
Component-based software development (CBSD) offers many advantages like reduced product time to market, reduced complexity and cost etc. Despite these advantages its wide scale ut...
Ammar Masood, Sahra Sedigh-Ali, Arif Ghafoor
COMPSAC
2005
IEEE
13 years 9 months ago
A Low-Latency Checkpointing Scheme for Mobile Computing Systems
Fault-tolerant mobile computing systems have different requirements and restrictions, not taken into account by conventional distributed systems. This paper presents a coordinate...
Guohui Li, LihChyun Shu
COMPSAC
2005
IEEE
13 years 9 months ago
Scoped Broadcast in Dynamic Peer-to-Peer Networks
Hung-Chang Hsiao, Chung-Ta King
COMPSAC
2005
IEEE
13 years 9 months ago
Similarity Measurement Between Images
Experimental results of applying two similarity measurements, Euclidean distance and chord distance, to test a set of six Brodatz’s textures are reported. Experiments show that ...
Chaur-Chin Chen, Hsueh-Ting Chu
CSMR
2006
IEEE
13 years 9 months ago
Search-Based Software Maintenance
The high cost of software maintenance could potentially be greatly reduced by the automatic refactoring of object-oriented programs to increase their understandability, adaptabili...
Mark Kent O'Keeffe, Mel Ó Cinnéide