Sciweavers

1541 search results - page 45 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
ECBS
2003
IEEE
145views Hardware» more  ECBS 2003»
15 years 5 months ago
Model Checking and Evidence Exploration
We present an algebraic framework for evidence exploration: the process of interpreting, manipulating, and navigating the proof structure or evidence produced by a model checker w...
Yifei Dong, C. R. Ramakrishnan, Scott A. Smolka
99
Voted
ICSE
2009
IEEE-ACM
15 years 7 months ago
Verifying networked programs using a model checker extension
Model checking finds failures in software by exploring every possible execution schedule. Until recently it has been mainly applied to stand-alone applications. This paper presen...
Watcharin Leungwattanakit, Cyrille Artho, Masami H...
118
Voted
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 4 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
BPM
2009
Springer
146views Business» more  BPM 2009»
15 years 7 months ago
Instantaneous Soundness Checking of Industrial Business Process Models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications and o...
Dirk Fahland, Cédric Favre, Barbara Jobstma...
188
Voted
OOIS
2001
Springer
15 years 5 months ago
Analysis of Software Engineering Data Using Computational Intelligence Techniques
The accurate estimation of software development effort has major implications for the management of software development in the industry. Underestimates lead to time pressures tha...
Gabriel Jarillo, Giancarlo Succi, Witold Pedrycz, ...