Sciweavers

487 search results - page 36 / 98
» Do Onboarding Programs Work
Sort
View
CC
2006
Springer
108views System Software» more  CC 2006»
13 years 11 months ago
Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers
This paper presents a new worklist algorithm that significantly speeds up a large class of flow-sensitive data-flow analyses, including typestate error checking and pointer analysi...
Teck Bok Tok, Samuel Z. Guyer, Calvin Lin
CP
2005
Springer
14 years 1 months ago
Partial Redundant Modeling
In the context of previous work on redundant modeling, permutation problems and matrix modeling, we introduce the notion of partial redundant modeling and categorical channeling co...
Tiziana Ligorio, Susan L. Epstein
RTSS
1996
IEEE
13 years 12 months ago
A framework for implementing objects and scheduling tasks in lock-free real-time systems
We present an integrated framework for developing realtime systems in which lock-free algorithms are employed to implement shared objects. There are two key objectives of our work...
James H. Anderson, Srikanth Ramamurthy
ERCIM
2008
78views more  ERCIM 2008»
13 years 7 months ago
Test Coverage Analysis and Preservation for Requirements-Based Testing
The testing process for safety-critical systems is usually evaluated with code coverage criteria such as MC/DC (Modified Condition/Decision Coverage) defined in the standard DO-17...
Raimund Kirner, Susanne Kandl
SQJ
2002
90views more  SQJ 2002»
13 years 7 months ago
Critical Analysis of the PIE Testability Technique
Abstract. The work of Voas and colleagues has introduced, refined and applied the propagation, infection and execution (PIE) analysis technique for measuring testability of program...
Zuhoor A. Al-Khanjari, Martin R. Woodward, Haider ...