Sciweavers

1541 search results - page 218 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
PLDI
2005
ACM
15 years 6 months ago
Jungloid mining: helping to navigate the API jungle
Reuse of existing code from class libraries and frameworks is often difficult because APIs are complex and the client code required to use the APIs can be hard to write. We obser...
David Mandelin, Lin Xu, Rastislav Bodík, Do...
80
Voted
SIGSOFT
2004
ACM
16 years 1 months ago
Heuristic-guided counterexample search in FLAVERS
One of the benefits of finite-state verification (FSV) tools, such as model checkers, is that a counterexample is provided when the property cannot be verified. Not all counterexa...
Jianbin Tan, George S. Avrunin, Lori A. Clarke, Sh...
113
Voted
ICDE
2010
IEEE
241views Database» more  ICDE 2010»
15 years 24 days ago
Privometer: Privacy protection in social networks
— The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information ...
Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmag...
105
Voted
MASCOTS
2003
15 years 2 months ago
PEPA Nets
Abstract. In this paper we describe a formalism which uses the stochastic process algebra PEPA as the inscription language for labelled stochastic Petri nets. Viewed in another way...
Stephen Gilmore, Jane Hillston, Leïla Kloul
105
Voted
PPOPP
2009
ACM
16 years 1 months ago
Effective performance measurement and analysis of multithreaded applications
Understanding why the performance of a multithreaded program does not improve linearly with the number of cores in a sharedmemory node populated with one or more multicore process...
Nathan R. Tallent, John M. Mellor-Crummey