IBM Research

Results: 1429



#Item
391

N-Way Model Merging Julia Rubin Marsha Chechik IBM Research at Haifa, Israel

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-11-01 02:00:44
    392Computer network security / Software testing / National security / Secure communication / Vulnerability / Application security / Software bug / Threat / Cross-site scripting / Cyberwarfare / Computer security / Security

    A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:13
    393

    Security Path Verification with JasperGold

    Add to Reading List

    Source URL: www.research.ibm.com

    Language: English - Date: 2012-11-15 03:07:59
      394Software engineering / Automatic parallelization / OpenMP / Data parallelism / Parallel programming model / Data dependency / Instruction-level parallelism / Thread / Concurrent computing / Computing / Parallel computing / Computer programming

      Implicit Parallelism with Ordered Transactions Christoph von Praun IBM T.J. Watson Research Center  praun, cascaval  @us.ibm.com

      Add to Reading List

      Source URL: homes.cs.washington.edu

      Language: English - Date: 2007-09-14 13:31:04
      395

      Use case 1: Stopped-meters Problem definition: A stopped-meter is a meter that reports zero during a predefined period of time. The zero report can occur for two reasons: either the meter is faulty or else there is legit

      Add to Reading List

      Source URL: research.ibm.com

      Language: English - Date: 2013-05-01 07:21:34
        396Technology / Business / Computing / Formal methods / IBM Research / OWASP / Software verification / Model checking / Verification and validation / Software testing / Pharmaceutical industry / Validity

        HVCAgenda November 6 – Day 1 09:00 Registration 09:30 Opening Remarks Oded Cohn, Director, IBM

        Add to Reading List

        Source URL: www.research.ibm.com

        Language: English - Date: 2012-11-26 04:25:08
        397NoSQL / Transaction processing / Computer storage / Fault-tolerant computer systems / Distributed computing architecture / Session / Replication / Consistency model / IBM Lotus Notes / Data management / Computing / Data

        Session Guarantees for Weakly Consistent Replicated Data Douglas B. Terry, Alan J. Demers, Karin Petersen, Mike J. Spreitzer, Marvin M. Theimer, and Brent B. Welch Computer Science Laboratory Xerox Palo Alto Research Cen

        Add to Reading List

        Source URL: www.researchgate.net

        Language: English
        398

        Quality of Merge-Refactorings for Product Lines Julia Rubin1,2 and Marsha Chechik1 1 University of Toronto, Canada IBM Research in Haifa, Israel

        Add to Reading List

        Source URL: people.csail.mit.edu

        Language: English - Date: 2014-11-01 02:00:44
          399

          High-Level Loop Optimizations for GCC Daniel Berlin IBM T.J. Watson Research Center David Edelsohn IBM T.J. Watson Research Center

          Add to Reading List

          Source URL: gcc.cybermirror.org

          Language: English - Date: 2004-08-29 18:00:00
            400

            Combining Related Products into Product Lines Julia Rubin1,2 and Marsha Chechik1 1 University of Toronto, Canada IBM Research in Haifa, Israel

            Add to Reading List

            Source URL: people.csail.mit.edu

            Language: English - Date: 2014-11-01 02:00:44
              UPDATE