Sciweavers

3639 search results - page 575 / 728
» Provenance as Dependency Analysis
Sort
View
99
Voted
KBSE
2003
IEEE
15 years 6 months ago
Automated Environment Generation for Software Model Checking
A key problem in model checking open systems is environment modeling (i.e., representing the behavior of the execution context of the system under analysis). Software systems are ...
Oksana Tkachuk, Matthew B. Dwyer, Corina S. Pasare...
98
Voted
SCAM
2003
IEEE
15 years 6 months ago
Design and Implementation of Bytecode-based Java Slicing System
Program slice is a set of statements that affect the value of variable v in a statement s. In order to calculate a program slice, we must know the dependence relations between sta...
Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Kat...
SISW
2003
IEEE
15 years 6 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
95
Voted
WCRE
2003
IEEE
15 years 6 months ago
Identification of Software Instabilities
As software evolves, maintenance practices require a process of accommodating changing requirements while minimizing the cost of implementing those changes. Over time, incompatibi...
Jennifer Bevan, E. James Whitehead Jr.
103
Voted
AFRIGRAPH
2003
ACM
15 years 6 months ago
Psychophysically based artistic techniques for increased perceived realism of virtual environments
The perceived realism of a computer generated image depends on the accuracy of the modeling and illumination calculations, the limitations of the display device, and the way in wh...
Peter Longhurst, Patrick Ledda, Alan Chalmers