Sciweavers

3311 search results - page 608 / 663
» Deductive Object Programming
Sort
View
ICCD
2006
IEEE
97views Hardware» more  ICCD 2006»
15 years 6 months ago
Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection
Pointer bugs associated with dynamically-allocated objects resulting in out-of-bounds memory access are an important class of software bugs. Because such bugs cannot be detected e...
Jin-Yi Wang, Yen-Shiang Shue, T. N. Vijaykumar, Sa...
ACSAC
2009
IEEE
15 years 4 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
ADBIS
2009
Springer
140views Database» more  ADBIS 2009»
15 years 4 months ago
Optimizing Maintenance of Constraint-Based Database Caches
Abstract. Caching data reduces user-perceived latency and often enhances availability in case of server crashes or network failures. DB caching aims at local processing of declarat...
Joachim Klein 0002, Susanne Braun
SPIN
2009
Springer
15 years 4 months ago
Subsumer-First: Steering Symbolic Reachability Analysis
Abstract. Symbolic reachability analysis provides a basis for the verification of software systems by offering algorithmic support for the exploration of the program state space ...
Andrey Rybalchenko, Rishabh Singh
DIGITEL
2008
IEEE
15 years 4 months ago
Games as Skins for Online Tests
: Games play a dual role: they test the player’s competence, and at the same time provide learning opportunities. They offer a simple form of a reward – the pleasure of playing...
Srinivasan Ramani, Venkatagiri Sirigiri, Nila Lohi...