Sciweavers

1412 search results - page 88 / 283
» The Value of Outsourced Software
Sort
View
SIGSOFT
2004
ACM
16 years 2 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
SIGSOFT
2010
ACM
14 years 11 months ago
Representation dependence testing using program inversion
The definition of a data structure may permit many different concrete representations of the same logical content. A (client) program that accepts such a data structure as input i...
Aditya Kanade, Rajeev Alur, Sriram K. Rajamani, Ga...
XPU
2010
Springer
14 years 12 months ago
Extreme Product Line Engineering - Refactoring for Variability: A Test-Driven Approach
Software product lines - families of similar but not identical software products - need to address the issue of feature variability. That is, a single feature might require various...
Yaser Ghanam, Frank Maurer
CODES
2002
IEEE
15 years 6 months ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
162
Voted
COMPSYSTECH
2011
14 years 1 months ago
Encoding watermark numbers as cographs using self-inverting permutations
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
Maria Chroni, Stavros D. Nikolopoulos