Sciweavers

1489 search results - page 166 / 298
» The First Bug Report
Sort
View
IISWC
2009
IEEE
15 years 11 months ago
Logicalization of communication traces from parallel execution
—Communication traces are integral to performance modeling and analysis of parallel programs. However, execution on a large number of nodes results in a large trace volume that i...
Qiang Xu, Jaspal Subhlok, Rong Zheng, Sara Voss
ISMVL
2009
IEEE
107views Hardware» more  ISMVL 2009»
15 years 11 months ago
Regular Encodings from Max-CSP into Partial Max-SAT
We define a number of original encodings, called regular encodings, that map Max-CSP instances into Partial MaxSAT instances. First, we obtain new direct and (minimal) support en...
Josep Argelich, Alba Cabiscol, Inês Lynce, F...
CSEE
2009
Springer
15 years 11 months ago
A Global and Competition-Based Model for Fostering Technical and Soft Skills in Software Engineering Education
The project experience described in this paper builds upon three years of running global software development projects in an educational setting. It explicitly addresses some of t...
Olly Gotel, Vidya Kulkarni, Moniphal Say, Christel...
MODELS
2009
Springer
15 years 11 months ago
Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation
A well known challenge in the formal methods domain is to improve their integration with practical engineering methods. In the context of embedded systems, model checking requires ...
Philippe Dhaussy, Pierre Yves Pillain, Stephen Cre...
155
Voted
SPIN
2009
Springer
15 years 11 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...