Sciweavers

1016 search results - page 127 / 204
» Automatic Analysis of Programming Assignments
Sort
View
162
Voted
ICSM
2003
IEEE
15 years 8 months ago
Reverse Engineering of the Interaction Diagrams from C++ Code
In object oriented programming, the functionalities of a system result from the interactions (message exchanges) among the objects allocated by the system. While designing object ...
Paolo Tonella, Alessandra Potrich
132
Voted
BMCBI
2008
148views more  BMCBI 2008»
15 years 2 months ago
Automating dChip: toward reproducible sharing of microarray data analysis
Background: During the past decade, many software packages have been developed for analysis and visualization of various types of microarrays. We have developed and maintained the...
Cheng Li
132
Voted
CCS
2008
ACM
15 years 4 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
102
Voted
HASKELL
2009
ACM
15 years 9 months ago
Roll your own test bed for embedded real-time protocols: a haskell experience
We present by example a new application domain for functional languages: emulators for embedded real-time protocols. As a casestudy, we implement a simple emulator for the Biphase...
Lee Pike, Geoffrey M. Brown, Alwyn Goodloe
103
Voted
SAC
2006
ACM
15 years 8 months ago
Decoupling classes with inferred interfaces
Using small, context-specific interfaces in variable declarations serves the decoupling of classes and increases a program’s flexibility. To minimize its interface, a thorough a...
Friedrich Steimann, Philip Mayer, Andreas Meissner