Sciweavers

82 search results - page 11 / 17
» Soft-Error Detection Using Control Flow Assertions
Sort
View
DKE
2010
112views more  DKE 2010»
14 years 9 months ago
An integer programming based approach for verification and diagnosis of workflows
Workflow analysis is indispensable to capture modeling errors in workflow designs. While several workflow analysis approaches have been defined previously, these approaches do not...
Rik Eshuis, Akhil Kumar
PLDI
1990
ACM
15 years 1 months ago
A Fresh Look at Optimizing Array Bound Checking
- This paper describes techniques for optimizing range checks performed to detect array bound violations. In addition to the elimination of range check:s, the optimizations discuss...
Rajiv Gupta
CCS
2010
ACM
14 years 9 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
ICPR
2008
IEEE
15 years 4 months ago
Automatic extraction of natural fracture traces from borehole images
Natural fractures may greatly affect wellbore stability and fluid flow in oil reservoirs. The detection of fracture heterogeneities—also named fracture traces—on electrical im...
Josselin Kherroubi
JSS
2008
122views more  JSS 2008»
14 years 8 months ago
Traffic-aware stress testing of distributed real-time systems based on UML models using genetic algorithms
This report presents a model-driven, stress test methodology aimed at increasing chances of discovering faults related to network traffic in Distributed Real-Time Systems (DRTS). T...
Vahid Garousi, Lionel C. Briand, Yvan Labiche