Sciweavers

618 search results - page 111 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
SCESM
2006
ACM
238views Algorithms» more  SCESM 2006»
15 years 3 months ago
Nobody's perfect: interactive synthesis from parametrized real-time scenarios
As technical systems keep growing more complex and sophisticated, designing software for the safety-critical coordination between their components becomes increasingly difficult....
Holger Giese, Stefan Henkler, Martin Hirsch, Flori...
IJCAI
1989
14 years 10 months ago
A Modest, but Semantically Well Founded, Inheritance Reasoner
A modest exception allowing inheritance reasoner is presented. The reasoner allows restricted, but semantically well founded, defeasible property inheritance. Furthermore, it give...
Fahiem Bacchus
CCS
2011
ACM
13 years 9 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
92
Voted
EUROMICRO
2006
IEEE
15 years 3 months ago
A Modeling Paradigm for Integrated Modular Avionics Design
This paper presents the modeling paradigm for Integrated Modular Avionics Design MIMAD V0, which is an extensible component-oriented framework that enables high level models of sy...
Abdoulaye Gamatié, Christian Brunette, Roma...
90
Voted
EUROSPI
2004
Springer
15 years 2 months ago
On-Site Customer in an XP Project: Empirical Results from a Case Study
Abstract. Extreme programming (XP), similar to other agile software development methods, values close collaboration with customers. One of the XP's practices suggests that cus...
Juha Koskela, Pekka Abrahamsson