Abstract--Many heterogeneous embedded systems, for example industrial automation and automotive applications, require hard-real time constraints to be exhaustively verified - which...
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
This paper presents the results of a feasability study that was carried out to evaluate the construction of Use Case Models by comparing the models with groups that used the GUCCRA...
Anderson Belgamo, Sandra Camargo Pinto Ferraz Fabb...
The field of program comprehension is characterized by both the continuing development of new tools and techniques and the adaptation of existing techniques to address program co...
Massimiliano Di Penta, R. E. Kurt Stirewalt, Eilee...
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...