Sciweavers

1027 search results - page 190 / 206
» Callgraph properties of executables
Sort
View
143
Voted
ISSTA
2009
ACM
15 years 10 months ago
Automatic system testing of programs without test oracles
Metamorphic testing has been shown to be a simple yet effective technique in addressing the quality assurance of applications that do not have test oracles, i.e., for which it is ...
Christian Murphy, Kuang Shen, Gail E. Kaiser
131
Voted
IISWC
2008
IEEE
15 years 10 months ago
On the representativeness of embedded Java benchmarks
— Java has become one of the predominant languages for embedded and mobile platforms due to its architecturally neutral design, portability, and security. But Java execution in t...
Ciji Isen, Lizy Kurian John, Jung Pil Choi, Hyo Ju...
133
Voted
IPPS
2008
IEEE
15 years 10 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
IROS
2008
IEEE
151views Robotics» more  IROS 2008»
15 years 10 months ago
A performance sensitive hormone-inspired system for task distribution amongst evolving robots
— A hormone-inspired task scheduling method is described which assigns tasks to a group of robots, taking into account the robots’ performances. This method draws on previous w...
Joanne H. Walker, Myra S. Wilson
CSFW
2007
IEEE
15 years 10 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...