We present a new approach for automatic verification of data-dependent programs manipulating dynamic heaps. A heap is encoded by a graph where the nodes represent the cells, and t...
Parosh Aziz Abdulla, Muhsin Atto, Jonathan Cederbe...
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
With the advent of multicore processors, it has become imperative to write parallel programs if one wishes to exploit the next generation of processors. This paper deals with skyli...
Sungwoo Park, Taekyung Kim, Jonghyun Park, Jinha K...
This paper introduces a set of challenges for developing a dissemination service over a Web collaborative network. We define specific metrics for working on a co-authorship researc...
Giseli Rabello Lopes, Mirella M. Moro, Leandro Kru...
—Large scale systems (LSS) contain multiple subsystems that interact across multiple nodes in sometimes unforeseen and complicated ways. As a result, pinpointing the subsystems t...