Sciweavers

2082 search results - page 116 / 417
» Change Paths in Reasoning!
Sort
View
127
Voted
ACTA
2010
191views more  ACTA 2010»
15 years 3 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar
144
Voted
INFSOF
2007
104views more  INFSOF 2007»
15 years 3 months ago
A state-based approach to integration testing based on UML models
: Correct functioning of object-oriented software depends upon the successful integration of classes. While individual classes may function correctly, several new faults can arise ...
Shaukat Ali, Lionel C. Briand, Muhammad Jaffar-Ur ...
124
Voted
IEPOL
2010
107views more  IEPOL 2010»
15 years 2 months ago
On the convergence of wired and wireless access network architectures
Wired and wireless access networks continue to evolve toward higher-capacity, multi-service systems. Recent wireless broadband networks such as 3G LTE and WiMax provide a general-...
William H. Lehr, John M. Chapin
160
Voted
TMC
2012
13 years 6 months ago
The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks
—We present the boomerang protocol to efficiently retain information at a particular geographic location in a sparse network of highly mobile nodes without using infrastructure ...
Tingting Sun, Bin Zan, Yanyong Zhang, Marco Grutes...
123
Voted
CSL
2004
Springer
15 years 7 months ago
A Functional Scenario for Bytecode Verification of Resource Bounds
We consider a scenario where (functional) programs in pre-compiled form are exchanged among untrusted parties. Our contribution is a system of annotations for the code that can be ...
Roberto M. Amadio, Solange Coupet-Grimal, Silvano ...