Sciweavers

1541 search results - page 88 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
103
Voted
SIGCSE
2010
ACM
121views Education» more  SIGCSE 2010»
15 years 7 months ago
Using strategies for assessment of programming exercises
Programming exercise assessment tools alleviate the task of teachers, and increase consistency of markings. Many programming exercise assessment tools are based on testing. A test...
Alex Gerdes, Johan Jeuring, Bastiaan Heeren
85
Voted
TACAS
2005
Springer
115views Algorithms» more  TACAS 2005»
15 years 6 months ago
On-the-Fly Reachability and Cycle Detection for Recursive State Machines
Searching the state space of a system using enumerative and on-the-fly depth-first traversal is an established technique for model checking finite-state systems. In this paper, ...
Rajeev Alur, Swarat Chaudhuri, Kousha Etessami, P....
169
Voted
IHI
2012
266views Healthcare» more  IHI 2012»
13 years 8 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...
APLAS
2008
ACM
15 years 2 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
ACSAC
2010
IEEE
14 years 10 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria