Sciweavers

4722 search results - page 557 / 945
» Encoding Program Executions
Sort
View
TCSB
2008
15 years 4 months ago
Robustness to Code and Data Deletion in Autocatalytic Quines
Abstract. Software systems nowadays are becoming increasingly complex and vulnerable to all sorts of failures and attacks. There is a rising need for robust self-repairing systems ...
Thomas Meyer, Daniel Schreckling, Christian F. Tsc...
143
Voted
ET
2002
72views more  ET 2002»
15 years 4 months ago
Deterministic Test Vector Compression/Decompression for Systems-on-a-Chip Using an Embedded Processor
Abstract. A novel approach for using an embedded processor to aid in deterministic testing of the other components of a system-on-a-chip (SOC) is presented. The tester loads a prog...
Abhijit Jas, Nur A. Touba
144
Voted
ICST
2010
IEEE
15 years 3 months ago
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes
—Although many static-analysis techniques have been developed for automatically detecting bugs, such as null dereferences, fewer automated approaches have been presented for anal...
Mijung Kim, Saurabh Sinha, Carsten Görg, Hina...
IEEECIT
2010
IEEE
15 years 3 months ago
Decompression Method for Massive Compressed Files in Mobile Rich Media Applications
Aiming at the characteristics of mobile terminal equipments, the program of decompressing massive compressed files in mobile rich media applications is investigated in this paper....
Houchen Li, Zhijie Qiu, Lei Luo
142
Voted
ISOLA
2010
Springer
15 years 3 months ago
WOMM: A Weak Operational Memory Model
Abstract. Memory models of shared memory concurrent programs define the values a read of a shared memory location is allowed to see. Such memory models are typically weaker than t...
Arnab De, Abhik Roychoudhury, Deepak D'Souza