Sciweavers

SAC
2015
ACM
8 years 5 months ago
COPICA - independent component analysis via copula techniques
Ray-Bing Chen, Meihui Guo, Wolfgang K. Härdle...
SAC
2015
ACM
8 years 5 months ago
TRES: a modular representation of schedulers, tasks, and messages to control simulations in simulink
Model-based development of CPS is based on the capability of early verification of system properties on a model of the controls and the controlled physical system, and the capabi...
Fabio Cremona, Matteo Morelli, Marco Di Natale
SAC
2015
ACM
8 years 5 months ago
The omission finder for debugging what-should-have-happened bugs in object-oriented programs
Trace-based debuggers help a debugging process by displaying a history of executed operations with their parameters in a run of a program. However, those debuggers are unable to p...
Kouhei Sakurai, Hidehiko Masuhara
SAC
2015
ACM
8 years 5 months ago
Examining the effectiveness of using concolic analysis to detect code clones
During the initial construction and subsequent maintenance of an application, duplication of functionality is common, whether intentional or otherwise. This replicated functionali...
Daniel E. Krutz, Samuel A. Malachowsky, Emad Shiha...
SAC
2015
ACM
8 years 5 months ago
Optimal planning for architecture-based self-adaptation via model checking of stochastic games
Architecture-based approaches to self-adaptation rely on architectural descriptions to reason about the best way of adapting the structure and behavior of software-intensive syste...
Javier Cámara, David Garlan, Bradley R. Sch...
SAC
2015
ACM
8 years 5 months ago
Bi-directional trust index computation in resource marketplace
Commoditizing idle computing resources by sharing them in a marketplace has gained increased attention in recent years as a potential disruption to the modern cloud-based service ...
Avinash Sharma, Tridib Mukherjee, Partha Dutta, Vi...
SAC
2015
ACM
8 years 5 months ago
Automated generation of visual web tests from DOM-based web tests
: Functional test automation is increasingly adopted by web applications developers. In particular, 2nd generation tools overcome the limitations of 1st generation tools, based on ...
Maurizio Leotta, Andrea Stocco, Filippo Ricca, Pao...
SAC
2015
ACM
8 years 5 months ago
Robust resource allocation in security games and ensemble modeling of adversary behavior
Game theoretic algorithms have been used to optimize the allocation of security resources to improve the protection of critical infrastructure against threats when limits on secur...
Arjun Tambe, Thanh Nguyen