Sciweavers

7209 search results - page 1095 / 1442
» Software Engineering for Multi-Agent Systems
Sort
View
151
Voted
ICSE
2009
IEEE-ACM
16 years 1 months ago
Analyzing critical process models through behavior model synthesis
Process models capture tasks performed by agents together with their control flow. Building and analyzing such models is important but difficult in certain areas such as safety-cr...
Christophe Damas, Bernard Lambeau, Francois Roucou...
76
Voted
ICSE
2009
IEEE-ACM
16 years 1 months ago
Do code clones matter?
Code cloning is not only assumed to inflate maintenance costs but also considered defect-prone as inconsistent changes to code duplicates can lead to unexpected behavior. Conseque...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
ICSE
2008
IEEE-ACM
16 years 1 months ago
jPredictor: a predictive runtime analysis tool for java
JPREDICTOR is a tool for detecting concurrency errors in JAVA programs. The JAVA program is instrumented to emit property-relevant events at runtime and then executed. The resulti...
Feng Chen, Traian-Florin Serbanuta, Grigore Rosu
88
Voted
SIGSOFT
2008
ACM
16 years 1 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
111
Voted
WWW
2003
ACM
16 years 1 months ago
Social Network Extraction of Conference Participants
In a ubiquitous computing environment, it is desirable to provide a user with information depending on a user's situation, such as time, location, user behavior, and social c...
Hironori Tomobe, Kôiti Hasida, Mitsuru Ishiz...
« Prev « First page 1095 / 1442 Last » Next »