Sciweavers

328 search results - page 54 / 66
» Software engineering for safety: a roadmap
Sort
View
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
15 years 5 months ago
ACOhg: dealing with huge graphs
Ant Colony Optimization (ACO) has been successfully applied to those combinatorial optimization problems which can be translated into a graph exploration. Artificial ants build s...
Enrique Alba, J. Francisco Chicano
APCCM
2009
15 years 25 days ago
Conceptual Application Domain Modelling
Application domain description precedes requirements engineering, and is the basis for the development of a software or information system that satisfies all expectations of its u...
Bernhard Thalheim, Klaus-Dieter Schewe, Hui Ma
CCS
2009
ACM
15 years 6 months ago
Finding bugs in exceptional situations of JNI programs
Software flaws in native methods may defeat Java’s guarantees of safety and security. One common kind of flaws in native methods results from the discrepancy on how exceptions...
Siliang Li, Gang Tan
POPL
2008
ACM
16 years 1 days ago
Proving non-termination
The search for proof and the search for counterexamples (bugs) are complementary activities that need to be pursued concurrently in order to maximize the practical success rate of...
Ashutosh Gupta, Thomas A. Henzinger, Rupak Majumda...
KBSE
2005
IEEE
15 years 5 months ago
Testing in resource constrained execution environments
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...