• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,796
Next 10 →

Table 3: Conflict resolution.

in Static Disassembly of Obfuscated Binaries Christopher Kruegel, William Robertson, Fredrik Valeur and Giovanni VignaReliable Software Group
by unknown authors
"... In PAGE 14: ... It is evident that it is desir- able to have as many conflicts as possible resolved by the first and second step, while the fifth step should never be required. Table3 shows for each program the number of basic blocks in the initial control flow graphs (column Initial Blocks) and the number of basic blocks in the control flow graphs after the conflict resolution phase (column Final Blocks). In addition, the number of basic blocks that were removed in each of the five steps of the con- flict resolution phase are shown.... In PAGE 14: ... In addition, the number of basic blocks that were removed in each of the five steps of the con- flict resolution phase are shown. The numbers given in Table3 were collected when the tool-specific modifica- tion was enabled. The results were very similar when only general techniques were used.... ..."

Table 3: Conflict resolution.

in Static Disassembly of Obfuscated Binaries
by Christopher Kruegel, William Robertson, Fredrik Valeur, Giovanni Vigna
"... In PAGE 14: ... It is evident that it is desir- able to have as many conflicts as possible resolved by the first and second step, while the fifth step should never be required. Table3 shows for each program the number of basic blocks in the initial control flow graphs (column Initial Blocks) and the number of basic blocks in the control flow graphs after the conflict resolution phase (column Final Blocks). In addition, the number of basic blocks that were removed in each of the five steps of the con- flict resolution phase are shown.... In PAGE 14: ... In addition, the number of basic blocks that were removed in each of the five steps of the con- flict resolution phase are shown. The numbers given in Table3 were collected when the tool-specific modifica- tion was enabled. The results were very similar when only general techniques were used.... ..."

Table 11. Resolution of Conflicts

in The landscape of concurrent development
by Thomas Zimmermann 2006
"... In PAGE 5: ... For instance the sequence GM means that a smooth integration (G) was followed by a commit (M). Table11 shows the results for the following categories: Changes were committed. The sequences GM or CM in- dicate that the integrated changes were committed to the repository.... ..."
Cited by 1

Table 4. Sibling conflict resolution

in The case for access control on xml relationships
by Thème Sym C, Béatrice Finance, Béatrice Finance, Saïda Medjdoub, Saïda Medjdoub, Projet Smis 2005
"... In PAGE 17: ... SMIS INRIA Sibling conflicts arise when two different rules, targeting the same ancestor-descendant relationship, exhibit two different Sibling decorrelations. Table4 summarizes all possible combinations of Sibling for these two rules and their associated conflict resolution. Again, the proposed conflict resolution being commutative, operand1 and operand2 represent either the Sibling parameter of RA1 or RA2 and the conflict resolution is done in accordance with the least privilege principle.... ..."
Cited by 6

Table 7. Conflict Resolution Methods

in Requirements Interaction Management
by William N. Robinson, Suzanne D. Pawlowski
"... In PAGE 28: ...4.1 Conflict Resolution Methods Table7 summarizes conflict resolution methods found in the requirements engineering related lit- erature. The six categories were derived from approximately 29 methods mentioned in the litera- ture, of which approximately 11 unique methods were identified.... ..."

Table 3. Conflict resolution algorithm

in MORE for Less: Model Recovery from Visual Interfaces for Multi-Device Application Design
by Yves Gaeremynck, Lawrence D. Bergman, Tessa Lau 2003
"... In PAGE 4: ... For example, closures involving caption and hint assignments may include many of the elements on a page. Instead, we perform a greedy search to resolve the conflict, as shown in Table3 . At each step, the resolution algorithm selects the fact from the closure with the highest score, removes it and its alternatives from the closure, then repeats until the conflict closure is exhausted.... ..."
Cited by 5

Table 3. Conflict resolution algorithm

in MORE for Less: Model Recovery from Visual Interfaces
by For Multi-Device Application, Yves Gaeremynck, Lawrence D. Bergman, Tessa Lau 2003
"... In PAGE 4: ... For example, closures involving caption and hint assignments may include many of the elements on a page. Instead, we perform a greedy search to resolve the conflict, as shown in Table3 . At each step, the resolution algorithm selects the fact from the closure with the highest score, removes it and its alternatives from the closure, then repeats until the conflict closure is exhausted.... ..."
Cited by 5

TABLE 6 Conflict Resolution apos;

in Making Fast Strategic Decisions in High-Velocity Environments
by Kathleen M. Eisenhardt 1989
Cited by 38

Table 9: Conflict resolution techniques

in Requirements Negotiation Using Multi-Criteria Preference Analysis
by Hoh Peter In, David Olson 2004
Cited by 1

Table 2: Semantically Conflicting Changes And Conflict Resolution Strategies

in On Dealing With Semantically Conflicting Business Process Changes ∗
by Stefanie Rinderle, Manfred Reichert, Peter Dadam
Next 10 →
Results 1 - 10 of 5,796
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University