Sciweavers

4719 search results - page 792 / 944
» Newtonian program analysis
Sort
View
PODS
2005
ACM
124views Database» more  PODS 2005»
16 years 4 months ago
Diagnosis of asynchronous discrete event systems: datalog to the rescue!
We consider query optimization techniques for data intensive P2P applications. We show how to adapt an old technique from deductive databases, namely Query-Sub-Query (QSQ), to a s...
Serge Abiteboul, Stefan Haar, Tova Milo, Zoë ...
ICSE
2004
IEEE-ACM
16 years 4 months ago
Imposing a Memory Management Discipline on Software Deployment
The deployment of software components frequently fails because dependencies on other components are not declared explicitly or are declared imprecisely. This results in an incompl...
Eelco Dolstra, Eelco Visser, Merijn de Jonge
ICSE
2005
IEEE-ACM
16 years 4 months ago
A B.S. degree in informatics: contextualizing software engineering education
Software engineering (SE) is very different in focus from traditional computer science: it is not just about computers and software, but as much about the context in which they ar...
André van der Hoek, David G. Kay, Debra J. ...
ICSE
2005
IEEE-ACM
16 years 4 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski
ICSE
2008
IEEE-ACM
16 years 4 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens