Sciweavers

1036 search results - page 190 / 208
» Verification Programs for Abduction
Sort
View
ECAIW
1994
Springer
15 years 8 months ago
Representing and Executing Agent-Based Systems
Abstract. In this paper we describe an approach to the representation and implementation of agent-based systems where the behaviour of an individual agent is represented by a set o...
Michael Fisher
CAV
2008
Springer
158views Hardware» more  CAV 2008»
15 years 6 months ago
Linear Arithmetic with Stars
We consider an extension of integer linear arithmetic with a "star" operator takes closure under vector addition of the solution set of a linear arithmetic subformula. We...
Ruzica Piskac, Viktor Kuncak
CAV
2008
Springer
160views Hardware» more  CAV 2008»
15 years 6 months ago
Scalable Shape Analysis for Systems Code
Pointer safety faults in device drivers are one of the leading causes of crashes in operating systems code. In principle, shape analysis tools can be used to prove the absence of t...
Hongseok Yang, Oukseh Lee, Josh Berdine, Cristiano...
ESEM
2008
ACM
15 years 6 months ago
On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques
Benchmarks provide an experimental basis for evaluating software engineering processes or techniques in an objective and repeatable manner. We present the FAULTBENCH v0.1 benchmar...
Sarah Smith Heckman, Laurie Williams
IIWAS
2008
15 years 5 months ago
WEB-PerformCharts: a collaborative web-based tool for test case generation from statecharts
Distributed development of software has turned into a natural and modern approach where teams spread over the world cooperate to develop a software product, and this has become po...
Alessandro Oliveira Arantes, Nandamudi Lankalapall...