Sciweavers

1016 search results - page 125 / 204
» Automatic Analysis of Programming Assignments
Sort
View
110
Voted
FM
2009
Springer
123views Formal Methods» more  FM 2009»
15 years 10 months ago
"Carbon Credits" for Resource-Bounded Computations Using Amortised Analysis
Abstract. Bounding resource usage is important for a number of areas, notably real-time embedded systems and safety-critical systems. In this paper, we present a fully automatic st...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
123
Voted
ICS
1993
Tsinghua U.
15 years 7 months ago
Static and Dynamic Evaluation of Data Dependence Analysis
—Data dependence analysis techniques are the main component of today’s strategies for automatic detection of parallelism. Parallelism detection strategies are being incorporate...
Paul Petersen, David A. Padua
137
Voted
CCS
2011
ACM
14 years 3 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
IWPSE
2010
IEEE
15 years 1 months ago
Evolutional analysis of licenses in FOSS
FOSS (Free and Open Source System) is repeatedly modied and reused by other FOSS or proprietary software systems. They are released to others under specic licenses whose terms and...
Yuki Manabe, Yasuhiro Hayase, Katsuro Inoue
100
Voted
ICSE
2009
IEEE-ACM
16 years 4 months ago
Safe-commit analysis to facilitate team software development
Software development teams exchange source code in shared repositories. These repositories are kept consistent by having developers follow a commit policy, such as "Program e...
Jan Wloka, Barbara G. Ryder, Frank Tip, Xiaoxia Re...