Sciweavers

396 search results - page 75 / 80
» Using Refinement Checking as System Testing
Sort
View
79
Voted
SENSYS
2004
ACM
15 years 3 months ago
Synopsis diffusion for robust aggregation in sensor networks
Previous approaches for computing duplicate-sensitive aggregates in sensor networks (e.g., in TAG) have used a tree topology, in order to conserve energy and to avoid double-count...
Suman Nath, Phillip B. Gibbons, Srinivasan Seshan,...
AADEBUG
2005
Springer
15 years 3 months ago
Tdb: a source-level debugger for dynamically translated programs
Debugging techniques have evolved over the years in response to changes in programming languages, implementation techniques, and user needs. A new type of implementation vehicle f...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
OOPSLA
2007
Springer
15 years 3 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
ACMSE
2006
ACM
15 years 3 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
BMCBI
2008
128views more  BMCBI 2008»
14 years 9 months ago
Validation of an NSP-based (negative selection pattern) gene family identification strategy
Background: Gene family identification from ESTs can be a valuable resource for analysis of genome evolution but presents unique challenges in organisms for which the entire genom...
Ronald L. Frank, Cyriac Kandoth, Fikret Erç...