Sciweavers

1938 search results - page 173 / 388
» Dependable Software
Sort
View
CC
2008
Springer
131views System Software» more  CC 2008»
15 years 2 months ago
Exposure-Resilient Extractors and the Derandomization of Probabilistic Sublinear Time
There exists a positive constant < 1 such that for any function T(n) n and for any problem L BPTIME(T(n)), there exists a deterministic algorithm running in poly(T(n)) time w...
Marius Zimand
156
Voted
ISSE
2010
15 years 28 days ago
An integrated multi-view model evolution framework
A UML model of a software system can be represented by a sequence of model transformations, starting from an empty model. To effectively support the design of complex systems, tra...
Volker Stolz
IWPC
2009
IEEE
15 years 9 months ago
A plethora of paths
A common static software bug detection technique is to use path simulation. Each execution path is simulated using symbolic variables to determine if any software errors could occ...
Eric Larson
VL
2006
IEEE
104views Visual Languages» more  VL 2006»
15 years 8 months ago
Pair Collaboration in End-User Debugging
The problem of dependability in end-user programming is an emerging area of interest. Pair collaboration in end-user software development may offer a way for end users to debug th...
Thippaya Chintakovid, Susan Wiedenbeck, Margaret M...
ESOP
2010
Springer
15 years 12 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh