Roaring bitmaps: Implementation of an optimized software library

D Lemire, O Kaser, N Kurz, L Deri… - Software: Practice …, 2018 - Wiley Online Library
Compressed bitmap indexes are used in systems such as Git or Oracle to accelerate
queries. They represent sets and often support operations such as unions, intersections …

[KÖNYV][B] Towards automated system synthesis using sciduction

SK Jha - 2011 - search.proquest.com
Automated synthesis of systems that are correct by construction has been a long-standing
goal of computer science. Synthesis is a creative task and requires human intuition and skill …

Speeding up test execution with increased cache locality

P Stratis, A Rajan - Software Testing, Verification and Reliability, 2018 - Wiley Online Library
As the scale and complexity of software increases, the number of tests needed for effective
validation becomes extremely large. Executing these large test suites is expensive, both in …

A system for segmentation and recognition of totally unconstrained handwritten numeral strings

Z Shi, SN Srihari, YC Shiu… - Proceedings of the …, 1997 - ieeexplore.ieee.org
Proposes a system for the segmentation and recognition of totally unconstrained
handwritten numeral strings. The system is composed of several document analysis …

Memory efficient 3D integral volumes

M Urschler, A Bornik, M Donoser - Proceedings of the IEEE …, 2013 - cv-foundation.org
Integral image data structures are very useful in computer vision applications that involve
machine learning approaches based on ensembles of weak learners. The weak learners …

Detecting Reference Counting Vulnerabilities in COM Objects

F Gu, Q Guo, X Gong - 2024 12th International Conference on …, 2024 - ieeexplore.ieee.org
Component Object Model (COM) is a fundamental binary-interface technology developed by
Microsoft, designed to facilitate the creation and interaction of software components in a …

Benchmarking optimised algorithms for transitive closure

V Pieterse, L Cleophas - Proceedings of the South African Institute of …, 2017 - dl.acm.org
We investigate the impact of using different algorithmic techniques and data representations
in algorithms to calculate the transitive closure of a finite binary relation. These techniques …

[PDF][PDF] Addressing the Addressability Problem: Dense/Padded Packed Booleans in SaC

A van Abkoude - 2024 - cs.ru.nl
In most languages, booleans are stored in a byte or a larger unit, this is a sensible choice as
the byte is the minimally addressable unit. However, there are only two possible values for a …

Software testing: test suite compilation and execution optimizations

P Stratis - 2020 - era.ed.ac.uk
The requirements and responsibilities assumed by software have increasingly rendered it to
be large and complex. Testing to ensure that software meets all its requirements and is free …

[PDF][PDF] Distributed duplicate removal

S Schlag - Master's thesis, KIT, 2013 - ae.iti.kit.edu
The distributed duplicate removal problem is concerned with the detection and subsequent
elimination of all duplicate elements in a given multiset that is distributed over several …