Sciweavers

88 search results - page 9 / 18
» A Comparison of Modular Verification Techniques
Sort
View
ESEM
2008
ACM
14 years 11 months ago
On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques
Benchmarks provide an experimental basis for evaluating software engineering processes or techniques in an objective and repeatable manner. We present the FAULTBENCH v0.1 benchmar...
Sarah Smith Heckman, Laurie Williams
ICPR
2010
IEEE
14 years 7 months ago
On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis
In this paper, we propose a novel approach for identity verification based on the directional analysis of velocity-based partitions of an on-line signature. First, interfeature dep...
Muhammad Talal Ibrahim, Matthew J. Kyan, M. Aurang...
SIGSOFT
2010
ACM
14 years 7 months ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan
SIGSOFT
2003
ACM
15 years 10 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...
POPL
2006
ACM
15 years 10 months ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao