Sciweavers

Share
SIGSOFT
2003
ACM
10 years 5 months ago
Evaluating and improving the automatic analysis of implicit invocation systems
Model checking and other finite-state analysis techniques have been very successful when used with hardware systems and less successful with software systems. It is especially di...
Jeremy S. Bradbury, Jürgen Dingel
SIGSOFT
2003
ACM
10 years 5 months ago
Use case-based testing of product lines
This paper presents PLUTO, a simple and intuitive methodology to manage the testing process of product lines, described as Product Lines Use Cases (PLUCs). PLUCs are an extension ...
Antonia Bertolino, Stefania Gnesi
SIGSOFT
2003
ACM
10 years 5 months ago
Refinements and multi-dimensional separation of concerns
1 Step-wise refinement (SWR) asserts that complex programs can be derived from simple programs by progressively adding features. The length of a program specification is the number...
Don S. Batory, Jia Liu, Jacob Neal Sarvela
SIGSOFT
2003
ACM
10 years 5 months ago
Fluent model checking for event-based systems
Model checking is an automated technique for verifying that a system satisfies a set of required properties. Such properties are typically expressed as temporal logic formulas, in...
Dimitra Giannakopoulou, Jeff Magee
SIGSOFT
2003
ACM
10 years 5 months ago
Modeling and validation of service-oriented architectures: application vs. style
Most applications developed today rely on a given middleware platform which governs the interaction between components, the access to resources, etc. To decide, which platform is ...
Luciano Baresi, Reiko Heckel, Sebastian Thöne...
SIGSOFT
2003
ACM
10 years 5 months ago
EFFICIENT: a tool set for supporting the modelling and validation of ebXML
Rik Eshuis, Pierre Brimont, Eric Dubois, Bertrand ...
SIGSOFT
2003
ACM
10 years 5 months ago
Eliminating redundancies with a "composition with adaptation" meta-programming technique
Redundant code obstructs program understanding and contributes to high maintenance costs. While most experts agree on that, opinions on how serious the problem of redundancies rea...
Stan Jarzabek, Shubiao Li
SIGSOFT
2003
ACM
11 years 14 days ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
SIGSOFT
2003
ACM
11 years 14 days ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
books