Sciweavers

694 search results - page 107 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
SIGSOFT
2006
ACM
16 years 15 days ago
SYNERGY: a new algorithm for property checking
We consider the problem if a given program satisfies a specified safety property. Interesting programs have infinite state spaces, with inputs ranging over infinite domains, and f...
Bhargav S. Gulavani, Thomas A. Henzinger, Yamini K...
RE
2005
Springer
15 years 5 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
SEFM
2005
IEEE
15 years 5 months ago
Formalising Control in Robust Spoken Dialogue Systems
The spoken language interface is now becoming an increasingly serious research topic with application to a wide range of highly engineered systems. Such systems not only include i...
Hui Shi, Robert J. Ross, John A. Bateman
IEEEPACT
2009
IEEE
15 years 6 months ago
StealthTest: Low Overhead Online Software Testing Using Transactional Memory
—Software testing is hard. The emergence of multicore architectures and the proliferation of bugprone multithreaded software makes testing even harder. To this end, researchers h...
Jayaram Bobba, Weiwei Xiong, Luke Yen, Mark D. Hil...
PERCOM
2006
ACM
15 years 11 months ago
Semantic Indexing for Recorded Educational Lecture Videos
In this paper, we present a general architecture and a new retrieval method for an educational system that is based on a knowledge base of existing recorded lectures. The extracti...
Stephan Repp, Christoph Meinel