Sciweavers

481 search results - page 58 / 97
» Differential symbolic execution
Sort
View
102
Voted
CORR
2010
Springer
188views Education» more  CORR 2010»
15 years 18 days ago
A physically-based particle model of emergent crowd behaviors
This paper presents a modeling process in order to produce a realistic simulation of crowds in the ancient Greek agora of Argos. This place was a social theater in which two kinds...
Laure Heïgéas, Annie Luciani, Joë...
108
Voted
BMCBI
2007
152views more  BMCBI 2007»
15 years 19 days ago
Difference-based clustering of short time-course microarray data with replicates
Background: There are some limitations associated with conventional clustering methods for short time-course gene expression data. The current algorithms require prior domain know...
Jihoon Kim, Ju Han Kim
118
Voted
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 4 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
178
Voted
POPL
2009
ACM
16 years 1 months ago
Static contract checking for Haskell
Program errors are hard to detect and are costly both to programmers who spend significant efforts in debugging, and for systems that are guarded by runtime checks. Static verific...
Dana N. Xu, Simon L. Peyton Jones, Koen Claessen
94
Voted
COMPSAC
2008
IEEE
15 years 7 months ago
Constraint Reasoning in Path-Oriented Random Testing
Path-oriented Random Testing (PRT) aims at generating a uniformly spread out sequence of random test data that activate a single control flow path within an imperative program. T...
Arnaud Gotlieb, Matthieu Petit