Sciweavers

1164 search results - page 60 / 233
» Using CBR for Semantic Analysis of Software Specifications
Sort
View
COMPSAC
2005
IEEE
15 years 5 months ago
Parallel Changes: Detecting Semantic Interferences
Parallel changes are a basic fact of modern software development. Where previously we looked at prima facie interference, here we investigate a less direct form that we call seman...
G. Lorenzo Thione, Dewayne E. Perry
PLDI
2009
ACM
16 years 14 days ago
Automatic generation of library bindings using static analysis
High-level languages are growing in popularity. However, decades of C software development have produced large libraries of fast, timetested, meritorious code that are impractical...
Tristan Ravitch, Steve Jackson, Eric Aderhold, Ben...
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
15 years 1 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
SIGSOFT
2007
ACM
16 years 17 days ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
ICSE
2001
IEEE-ACM
15 years 4 months ago
A Formal Approach to Component-Based Software Engineering: Education and Evaluation
This paper summarizes an approach for introducing component-based software engineering (CBSE) early in the undergraduate CS curriculum, and an evaluation of the impact of the appr...
Murali Sitaraman, Timothy J. Long, Bruce W. Weide,...