Sciweavers

618 search results - page 111 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
SCESM
2006
ACM
238views Algorithms» more  SCESM 2006»
15 years 5 months ago
Nobody's perfect: interactive synthesis from parametrized real-time scenarios
As technical systems keep growing more complex and sophisticated, designing software for the safety-critical coordination between their components becomes increasingly difficult....
Holger Giese, Stefan Henkler, Martin Hirsch, Flori...
IJCAI
1989
15 years 25 days ago
A Modest, but Semantically Well Founded, Inheritance Reasoner
A modest exception allowing inheritance reasoner is presented. The reasoner allows restricted, but semantically well founded, defeasible property inheritance. Furthermore, it give...
Fahiem Bacchus
CCS
2011
ACM
13 years 11 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
EUROMICRO
2006
IEEE
15 years 5 months ago
A Modeling Paradigm for Integrated Modular Avionics Design
This paper presents the modeling paradigm for Integrated Modular Avionics Design MIMAD V0, which is an extensible component-oriented framework that enables high level models of sy...
Abdoulaye Gamatié, Christian Brunette, Roma...
EUROSPI
2004
Springer
15 years 5 months ago
On-Site Customer in an XP Project: Empirical Results from a Case Study
Abstract. Extreme programming (XP), similar to other agile software development methods, values close collaboration with customers. One of the XP's practices suggests that cus...
Juha Koskela, Pekka Abrahamsson