Sciweavers

828 search results - page 105 / 166
» A New Model of Program Dependences for Reverse Engineering
Sort
View
POPL
2006
ACM
14 years 10 months ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao
SIGSOFT
2005
ACM
14 years 11 months ago
SOBER: statistical model-based bug localization
Automated localization of software bugs is one of the essential issues in debugging aids. Previous studies indicated that the evaluation history of program predicates may disclose...
Chao Liu 0001, Jiawei Han, Long Fei, Samuel P. Mid...
TRANSCI
2008
122views more  TRANSCI 2008»
13 years 10 months ago
Scheduling Locomotives and Car Transfers in Freight Transport
Abstract. We present a new model for a strategic locomotive scheduling problem arising at the Deutsche Bahn AG. The model is based on a multi-commodity min-cost flow formulation th...
Armin Fügenschuh, Henning Homfeld, Andreas Hu...
KBSE
2009
IEEE
14 years 5 months ago
Generating Fixes from Object Behavior Anomalies
Advances in recent years have made it possible in some cases to locate a bug (the source of a failure) automatically. But debugging is also about correcting bugs. Can tools do thi...
Valentin Dallmeier, Andreas Zeller, Bertrand Meyer
AMAST
2004
Springer
14 years 3 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns