the applicability of aspects as a means of implementing runtime contract checking has been demonstrated in prior work, where contracts are identified as cross-cutting concerns [12, 13]. Checking contracts at runtime e...
详细信息
Dynamic configuration techniques such as DVFS (Dynamic Voltage and Frequency Scaling) and turning on/off computers are well known ways to promote energy consumption reduction in web server clusters. this paper demonst...
详细信息
this paper describes a new approach to document classification based on visual features alone. Text-based retrieval systems perform poorly on noisy text. We have conducted series of experiments using cosine distance a...
详细信息
Meta-communication can be defined as all exchanges of information that are related to the conceptual model of the system, including the communication that takes place in order to clarify or overcome problems during th...
详细信息
the long term vision of smart service systems in which electronic environments are made sensitive and responsive to the presence of, possibly many, people is gradually taking shape through a number of pilot projects. ...
详细信息
Testing is one of the most expensive tasks in today's software development cycle and it is very important to devise techniques that speed up the whole testing process. In a recent paper [9], it has been shown that...
详细信息
作者:
Baudet, ChristianDias, ZanoniINRIA Grenoble Rhône-Alpes
Laboratoire de Biométrie et Biologie Évolutive Univ. Lyon 1 43 bd 11 Nov 69622 Villeurbanne Cedex France Institute of Computing
University of Campinas - Unicamp Cidade Universitaria Av. Albert Einstein 1251 CEP 13083-970 Campinas - São Paulo Brazil
In 2008, Braga et al. proposed an algorithm to perform the enumeration of traces that sort a signed permutation by reversals. this algorithm has exponential complexity in both time and space. the original implementati...
详细信息
the protection of wireless sensor networks is an important task, especially for critical situations such as intrusion detection, tamper monitoring, or military applications. To date, much of the emphasis on protecting...
详细信息
Among the many challenges of engineering dependable, self-managed, component-based systems is their need to make informed decisions about adaptive reconfigurations in response to changing requirements or a changing en...
详细信息
Client-side event logs may reveal patterns of usage of Web pages. Nevertheless, extracting useful and novel information from this voluminous data set is a challenge for evaluation tools, since a few minutes simple tas...
详细信息
暂无评论