Sciweavers

2957 search results - page 276 / 592
» Code analysis and CS-XML
Sort
View
IJFCS
2006
119views more  IJFCS 2006»
15 years 3 months ago
Enforcing Concurrent Temporal Behaviors
The outcome of verifying software is often a `counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understan...
Doron Peled, Hongyang Qu
CORR
2007
Springer
104views Education» more  CORR 2007»
15 years 3 months ago
Searching for low weight pseudo-codewords
— Belief Propagation (BP) and Linear Programming (LP) decodings of Low Density Parity Check (LDPC) codes are discussed. We summarize results of instanton/pseudo-codeword approach...
Michael Chertkov, Mikhail G. Stepanov
JUCS
2007
110views more  JUCS 2007»
15 years 3 months ago
Self-Evolving Petri Nets
: Nowadays, software evolution is a very hot topic. It is particularly complex when it regards critical and nonstopping systems. Usually, these situations are tackled by hard-codin...
Lorenzo Capra, Walter Cazzola
ICSE
2012
IEEE-ACM
13 years 6 months ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
139
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su