Sciweavers

828 search results - page 127 / 166
» A New Model of Program Dependences for Reverse Engineering
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
The effect of the number of inspectors on the defect estimates produced by capture-recapture models
Inspections can be made more cost-effective by using capturerecapture methods to estimate post-inspection defects. Previous capture-recapture studies of inspections used relativel...
Gursimran Singh Walia, Jeffrey C. Carver, Nachiapp...
OOPSLA
2004
Springer
14 years 1 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
AC
1998
Springer
13 years 8 months ago
Cellular Automata Models of Self-Replicating Systems
Abstract: Since von Neumann's seminal work around 1950, computer scientists and others have studied the algorithms needed to support self-replicating systems. Much of this wor...
James A. Reggia, Hui-Hsien Chou, Jason D. Lohn
WWW
2007
ACM
14 years 9 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
SIGSOFT
2008
ACM
14 years 9 months ago
Inter-context control-flow and data-flow test adequacy criteria for nesC applications
NesC is a programming language for applications that run on top of networked sensor nodes. Such an application mainly uses an interrupt to trigger a sequence of operations, known ...
Zhifeng Lai, Shing-Chi Cheung, Wing Kwong Chan