Sciweavers

2030 search results - page 251 / 406
» Checklists for Software Engineering Case Study Research
Sort
View
ICST
2009
IEEE
13 years 5 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
ICSM
2009
IEEE
14 years 2 months ago
Regression model checking
Model checking is a promising technique for verifying program behavior and is increasingly finding usage in industry. To date, however, researchers have primarily considered mode...
Guowei Yang, Matthew B. Dwyer, Gregg Rothermel
ICST
2008
IEEE
14 years 2 months ago
Relationships between Test Suites, Faults, and Fault Detection in GUI Testing
Software-testing researchers have long sought recipes for test suites that detect faults well. In the literature, empirical studies of testing techniques abound, yet the ideal tec...
Jaymie Strecker, Atif M. Memon
WCRE
2008
IEEE
14 years 2 months ago
Pitfalls in Aspect Mining
The research domain of aspect mining studies the problem of (semi-)automatically identifying potential aspects and crosscutting concerns in a software system, to improve the syste...
Kim Mens, Andy Kellens, Jens Krinke
AUIC
2006
IEEE
14 years 2 months ago
Middle-aged users' experience of short message service
Short Message Service (SMS) is a popular form of nonverbal mobile communication. To date, most research has focused upon the use of SMS by teenagers and young adults. Our work exa...
Christine Soriano, Gitesh K. Raikundalia, Jakub Sz...