Sciweavers

1304 search results - page 138 / 261
» Model Checking C Programs Using F-SOFT
Sort
View
APLAS
2010
ACM
15 years 3 months ago
JNI Light: An Operational Model for the Core JNI
Abstract. Through foreign function interfaces (FFIs), software components in different programming languages interact with each other in the same address space. Recent years have w...
Gang Tan
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
ICSE
2004
IEEE-ACM
16 years 3 months ago
Finding Latent Code Errors via Machine Learning over Program Executions
This paper proposes a technique for identifying program properties that indicate errors. The technique generates machine learning models of program properties known to result from...
Yuriy Brun, Michael D. Ernst
ECOOP
2010
Springer
15 years 6 months ago
Contract-Based Data Structure Repair Using Alloy
Contracts and specifications have long been used in object-oriented design, programming and testing to enhance reliability before software deployment. However, the use of specifica...
Razieh Nokhbeh Zaeem, Sarfraz Khurshid
ISSRE
2000
IEEE
15 years 7 months ago
Building Trust into OO Components Using a Genetic Analogy
Despite the growing interest for component-based systems, few works tackle the question of the trust we can bring into a component. This paper presents a method and a tool for bui...
Benoit Baudry, Vu Le Hanh, Jean-Marc Jéz&ea...