Sciweavers

371 search results - page 27 / 75
» Comparing models for identifying fault-prone software compon...
Sort
View
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
15 years 6 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
ICSE
2005
IEEE-ACM
15 years 12 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
ICRA
2007
IEEE
150views Robotics» more  ICRA 2007»
15 years 6 months ago
Enhancing Software Modularity and Extensibility: A Case for using Generic Data Representations
— Portable, modular and extensible software allows robotics researchers to pool their resources by sharing algorithms, thus advancing research in the field of robotics at a fast...
Gregory Broten
AOSE
2004
Springer
15 years 5 months ago
Organizational and Social Concepts in Agent Oriented Software Engineering
AOSE methodologies and models borrow various abstractions and concepts from the organization and sociology disciplines. Although they all ti-agent system as organized society, the ...
XinJun Mao, Eric Yu
ISCA
1991
IEEE
162views Hardware» more  ISCA 1991»
15 years 3 months ago
Comparison of Hardware and Software Cache Coherence Schemes
We use mean value analysis models to compare representative hardware and software cache coherence schemes for a large-scale shared-memory system. Our goal is to identify the workl...
Sarita V. Adve, Vikram S. Adve, Mark D. Hill, Mary...