Sciweavers

2539 search results - page 67 / 508
» Debugging Method Names
Sort
View
TACAS
2010
Springer
162views Algorithms» more  TACAS 2010»
15 years 4 months ago
Computing the Leakage of Information-Hiding Systems
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the oth...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
ADC
2004
Springer
97views Database» more  ADC 2004»
15 years 3 months ago
Static Analysis of XSLT Programs
XML is becoming the dominant standard for representing and exchanging data on the World Wide Web. The ability to transform and present data in XML is crucial and XSLT (Extensible ...
Ce Dong, James Bailey
GECCO
2008
Springer
112views Optimization» more  GECCO 2008»
14 years 11 months ago
Handling dynamic data structures in search based testing
There has been little attention to search based test data generation in the presence of pointer inputs and dynamic data structures, an area in which recent concolic methods have e...
Kiran Lakhotia, Mark Harman, Phil McMinn
ICPR
2008
IEEE
15 years 11 months ago
A practical method to reducing metal artifact for dental CT scanners
An integrated and effective metal artifact reduction method named Metal Erasing (ME) especially suited to dental applications is proposed. Layout of metals is identified as metal-...
Atsushi Katsumata, Koichi Ito, Koji Kobayashi, Tak...
ATAL
2004
Springer
15 years 3 months ago
Using the Experimental Method to Produce Reliable Self-Organised Systems
The ‘engineering’ and ‘adaptive’ approaches to system production are distinguished. It is argued that producing reliable self-organised software systems (SOSS) will necessa...
Bruce Edmonds