Sciweavers

165 search results - page 14 / 33
» A New Approach to Software Exploration: Back-Packing with GS...
Sort
View
ENTCS
2010
95views more  ENTCS 2010»
13 years 4 months ago
Quadtrees as an Abstract Domain
s as an Abstract Domain Jacob M. Howe1,4 Dept of Computing, City University London, UK Andy King1,3,5 School of Computing, University of Kent, Canterbury, UK Charles Lawrence-Jones...
Jacob M. Howe, Andy King, Charles Lawrence-Jones
IEEEARES
2010
IEEE
13 years 11 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
ICRA
2006
IEEE
77views Robotics» more  ICRA 2006»
14 years 1 months ago
Opening the Dialog: Robotics and the Internet
Abstract— Inter-component communication has received considerable attention by robotic software architects as various frameworks and toolkits have matured. While the resulting pl...
Anthony Cowley, Hwa-Chow Oliver Hsu, Camillo J. Ta...
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
13 years 11 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...
IFM
2009
Springer
124views Formal Methods» more  IFM 2009»
14 years 1 months ago
Dynamic Path Reduction for Software Model Checking
We present the new technique of dynamic path reduction (DPR), which allows one to prune redundant paths from the state space of a program under verification. DPR is a very general...
Zijiang Yang, Bashar Al-Rawi, Karem Sakallah, Xiao...