Sciweavers

1399 search results - page 206 / 280
» Verification of Test Suites
Sort
View
CCS
2008
ACM
15 years 1 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
ICSE
2010
IEEE-ACM
15 years 1 months ago
DETERMIN: inferring likely deterministic specifications of multithreaded programs
The trend towards multicore processors and graphic processing units is increasing the need for software that can take advantage of parallelism. Writing correct parallel programs u...
Jacob Burnim, Koushik Sen
BMCBI
2008
143views more  BMCBI 2008»
14 years 12 months ago
Automatic detection of exonic splicing enhancers (ESEs) using SVMs
Background: Exonic splicing enhancers (ESEs) activate nearby splice sites and promote the inclusion (vs. exclusion) of exons in which they reside, while being a binding site for S...
Britta Mersch, Alexander Gepperth, Sándor S...
OOPSLA
2010
Springer
14 years 9 months ago
Efficient modular glass box software model checking
Glass box software model checking incorporates novel techniques to identify similarities in the state space of a model checker and safely prune large numbers of redundant states w...
Michael Roberson, Chandrasekhar Boyapati
SIGSOFT
2010
ACM
14 years 9 months ago
An effective dynamic analysis for detecting generalized deadlocks
We present an effective dynamic analysis for finding a broad class of deadlocks, including the well-studied lock-only deadlocks as well as the less-studied, but no less widespread...
Pallavi Joshi, Mayur Naik, Koushik Sen, David Gay