Sciweavers

1407 search results - page 57 / 282
» Using Use Cases in Executable Z
Sort
View
128
Voted
EUROSYS
2006
ACM
15 years 11 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
117
Voted
HPDC
2005
IEEE
15 years 8 months ago
Recording and using provenance in a protein compressibility experiment
Very large scale computations are now becoming routinely used as a methodology to undertake scientific research. In this context, ‘provenance systems’ are regarded as the equ...
Paul T. Groth, Simon Miles, Weijian Fang, Sylvia C...
158
Voted
CASES
2007
ACM
15 years 6 months ago
A fast and generic hybrid simulation approach using C virtual machine
Instruction Set Simulators (ISSes) are important tools for cross-platform software development. The simulation speed is a major concern and many approaches have been proposed to i...
Lei Gao, Stefan Kraemer, Rainer Leupers, Gerd Asch...
ESEM
2007
ACM
15 years 6 months ago
Defect Detection Efficiency: Test Case Based vs. Exploratory Testing
This paper presents a controlled experiment comparing the defect detection efficiency of exploratory testing (ET) and test case based testing (TCT). While traditional testing lite...
Juha Itkonen, Mika Mäntylä, Casper Lasse...
117
Voted
ASPLOS
2004
ACM
15 years 8 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi