This paper summarizes the background and history leading to the development, adoption, and implementation of ABET's Engineering Criteria 2000 (EC2000). A sampling of program ...
Regression testing is often performed with a time budget and it does not allow executing all test cases. Test case prioritization techniques re-order test cases to increase the ra...
Dongjiang You, Zhenyu Chen, Baowen Xu, Bin Luo, Ch...
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Abstract— This paper focuses on large-scale distributed systems that can be modeled as workflows of activities sharing resources, knowledge, know-how and services. We propose a ...
We present a proof calculus and method for the static verification of assertions and procedure specifications in shared-memory concurrent programs. The key idea in our approach is...