Sciweavers

35 search results - page 5 / 7
» A Formal Framework for Program Anomaly Detection
Sort
View
IFIP
2010
Springer
14 years 6 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
PPOPP
2003
ACM
15 years 5 months ago
Hybrid dynamic data race detection
We present a new method for dynamically detecting potential data races in multithreaded programs. Our method improves on the state of the art in accuracy, in usability, and in ove...
Robert O'Callahan, Jong-Deok Choi
TAP
2010
Springer
134views Hardware» more  TAP 2010»
14 years 10 months ago
Testing First-Order Logic Axioms in Program Verification
Program verification systems based on automated theorem provers rely on user-provided axioms in order to verify domain-specific properties of code. However, formulating axioms corr...
Ki Yung Ahn, Ewen Denney
ASPDAC
1998
ACM
119views Hardware» more  ASPDAC 1998»
15 years 4 months ago
Integer Programming Models for Optimization Problems in Test Generation
— Test Pattern Generation for combinational circuits entails the identification of primary input assignments for detecting each fault in a set of target faults. An extension to ...
João P. Marques Silva
CLA
2006
15 years 1 months ago
Using FCA to Suggest Refactorings to Correct Design Defects
Abstract. Design defects are poor design choices resulting in a hard-tomaintain software, hence their detection and correction are key steps of a disciplined software process aimed...
Naouel Moha, Jihene Rezgui, Yann-Gaël Gu&eacu...