Sciweavers

516 search results - page 98 / 104
» Execution replay and debugging
Sort
View
NSPW
2003
ACM
15 years 4 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
ICSE
2010
IEEE-ACM
15 years 4 months ago
From behaviour preservation to behaviour modification: constraint-based mutant generation
The efficacy of mutation analysis depends heavily on its capability to mutate programs in such a way that they remain executable and exhibit deviating behaviour. Whereas the forme...
Friedrich Steimann, Andreas Thies
SC
2009
ACM
15 years 4 months ago
Plasma fusion code coupling using scalable I/O services and scientific workflows
In order to understand the complex physics of mother nature, physicist often use many approximations to understand one area of physics and then write a simulation to reduce these ...
Norbert Podhorszki, Scott Klasky, Qing Liu, Cipria...
104
Voted
ESOP
2001
Springer
15 years 4 months ago
Modeling an Algebraic Stepper
Programmers rely on the correctness of the tools in their programming environments. In the past, semanticists have studied the correctness of compilers and compiler analyses, which...
John Clements, Matthew Flatt, Matthias Felleisen
104
Voted
AMOST
2007
ACM
15 years 3 months ago
Using LTL rewriting to improve the performance of model-checker based test-case generation
Model-checkers have recently been suggested for automated software test-case generation. Several works have presented methods that create efficient test-suites using model-checker...
Gordon Fraser, Franz Wotawa