Sciweavers

452 search results - page 65 / 91
» Symbolic Execution of Behavioral Requirements
Sort
View
105
Voted
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
14 years 9 months ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...
91
Voted
SIGCSE
2009
ACM
143views Education» more  SIGCSE 2009»
15 years 5 months ago
Thinking about computational thinking
Jeannette Wing’s call for teaching Computational Thinking (CT) as a formative skill on par with reading, writing, and arithmetic places computer science in the category of basic...
James J. Lu, George H. L. Fletcher
SIGSOFT
2009
ACM
15 years 5 months ago
MSeqGen: object-oriented unit-test generation via mining source code
An objective of unit testing is to achieve high structural coverage of the code under test. Achieving high structural coverage of object-oriented code requires desirable method-ca...
Suresh Thummalapenta, Tao Xie, Nikolai Tillmann, J...
CSFW
2007
IEEE
15 years 5 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
QEST
2007
IEEE
15 years 5 months ago
Qualitative Logics and Equivalences for Probabilistic Systems
We investigate logics and equivalence relations that capture the qualitative behavior of Markov Decision Processes (MDPs). We present Qualitative Randomized Ctl (Qrctl): formulas o...
Luca de Alfaro, Krishnendu Chatterjee, Marco Faell...