Sciweavers

46 search results - page 8 / 10
» Automatically Generating Malicious Disks using Symbolic Exec...
Sort
View
ICRA
2005
IEEE
124views Robotics» more  ICRA 2005»
14 years 17 days ago
What Are the Ants Doing? Vision-Based Tracking and Reconstruction of Control Programs
— In this paper, we study the problem of going from a real-world, multi-agent system to the generation of control programs in an automatic fashion. In particular, a computer visi...
Magnus Egerstedt, Tucker R. Balch, Frank Dellaert,...
POPL
2000
ACM
13 years 10 months ago
Resource Bound Certification
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Karl Crary, Stephanie Weirich
HT
1998
ACM
13 years 11 months ago
Linking by Inking: Trailblazing in a Paper-Like Hypertext
“Linking by inking” is a new interface for reader-directed link construction that bridges reading and browsing activities. We are developing linking by inking in XLibris, a hy...
Morgan N. Price, Gene Golovchinsky, Bill N. Schili...
ICECCS
2002
IEEE
161views Hardware» more  ICECCS 2002»
13 years 12 months ago
Interclass Testing of Object Oriented Software
The characteristics of object-oriented software affect type and relevance of faults. In particular, the state of the objects may cause faults that cannot be easily revealed with t...
Vincenzo Martena, Alessandro Orso, Mauro Pezz&egra...
AMOST
2007
ACM
13 years 11 months ago
Achieving both model and code coverage with automated gray-box testing
We have devised a novel technique to automatically generate test cases for a software system, combining black-box model-based testing with white-box parameterized unit testing. Th...
Nicolas Kicillof, Wolfgang Grieskamp, Nikolai Till...