Sciweavers

7393 search results - page 27 / 1479
» Synthesis-for-testability using transformations
Sort
View
TOOLS
2008
IEEE
15 years 4 months ago
Guarded Program Transformations Using JTL
There is a growing research interest in employing the logic paradigm for making queries on software in general, and OOP software in particular. We describes a side-effect-free tech...
Tal Cohen, Joseph Gil, Itay Maman
APLAS
2006
ACM
15 years 3 months ago
Using Metadata Transformations to Integrate Class Extensions in an Existing Class Hierarchy
Abstract. Class extensions provide a fine-grained mechanism to define incremental modifications to class-based systems when standard subclassing mechanisms are inappropriate. To...
Markus Lumpe
GG
2008
Springer
14 years 10 months ago
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts
Behavior preservation, namely the fact that the behavior of a model is not altered by the transformations, is a crucial property in refactoring. The most common approaches to behav...
Guilherme Rangel, Leen Lambers, Barbara König...
ICASSP
2008
IEEE
15 years 4 months ago
Improved GMM-based language recognition using constrained MLLR transforms
In this paper we describe the application of a feature-space transform based on constrained maximum likelihood linear regression for unsupervised compensation of channel and speak...
Wade Shen, Douglas A. Reynolds
ESSOS
2009
Springer
15 years 2 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson