Sciweavers

1407 search results - page 214 / 282
» Using Use Cases in Executable Z
Sort
View
96
Voted
CSMR
2006
IEEE
15 years 8 months ago
Object-Oriented Legacy System Trace-based Logic Testing
When reengineering legacy systems, it is crucial to assess if the legacy behavior has been preserved or how it changed due to the reengineering effort. Ideally if a legacy system ...
Stéphane Ducasse, Tudor Gîrba, Roel W...
125
Voted
NDSS
2006
IEEE
15 years 8 months ago
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorit
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power pre...
Doug Szajda, Michael Pohl, Jason Owen, Barry G. La...
124
Voted
ISSTA
2006
ACM
15 years 8 months ago
Towards regression test selection for AspectJ programs
Regression testing aims at showing that code has not been adversely affected by modification activities during maintenance. Regression test selection techniques reuse tests from...
Jianjun Zhao, Tao Xie, Nan Li
141
Voted
HIPEAC
2005
Springer
15 years 8 months ago
Garbage Collection Hints
This paper shows that Appel-style garbage collectors often make suboptimal decisions both in terms of when and how to collect. We argue that garbage collection should be done when ...
Dries Buytaert, Kris Venstermans, Lieven Eeckhout,...
134
Voted
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 8 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi