Sciweavers

6960 search results - page 1061 / 1392
» Continuity Analysis of Programs
Sort
View
128
Voted
SIGSOFT
2008
ACM
16 years 5 months ago
Improving robustness of evolving exceptional behaviour in executable models
Executable models are increasingly being employed by development teams to implement robust software systems. Modern executable models offer powerful composition mechanisms that al...
Alessandro Garcia, Nélio Cacho, Thomas Cott...
139
Voted
SIGSOFT
2007
ACM
16 years 5 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
SIGSOFT
2007
ACM
16 years 5 months ago
Recovering and using use-case-diagram-to-source-code traceability links
Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining ...
Mark Grechanik, Kathryn S. McKinley, Dewayne E. Pe...
SIGSOFT
2002
ACM
16 years 5 months ago
Invariant inference for static checking
Static checking can verify the absence of errors in a program, but often requires written annotations or specifications. As a result, static checking can be difficult to use effec...
Jeremy W. Nimmer, Michael D. Ernst
ICDT
2009
ACM
149views Database» more  ICDT 2009»
16 years 5 months ago
Query languages for data exchange: beyond unions of conjunctive queries
The class of unions of conjunctive queries (UCQ) has been shown to be particularly well-behaved for data exchange; its certain answers can be computed in polynomial time (in terms...
Juan Reutter, Marcelo Arenas, Pablo Barceló
« Prev « First page 1061 / 1392 Last » Next »