Sciweavers

72 search results - page 12 / 15
» Dynamic detection of atomic-set-serializability violations
Sort
View
ICST
2010
IEEE
13 years 5 months ago
(Un-)Covering Equivalent Mutants
—Mutation testing measures the adequacy of a test suite by seeding artificial defects (mutations) into a program. If a test suite fails to detect a mutation, it may also fail to...
David Schuler, Andreas Zeller
DAIS
2003
13 years 8 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
CCS
2010
ACM
13 years 7 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
SIMULATION
2008
139views more  SIMULATION 2008»
13 years 7 months ago
Constitutive Hybrid Processes: a Process-Algebraic Semantics for Hybrid Bond Graphs
Models of physical systems have to be based on physical principles such as conservation of energy and continuity of power. These principles are inherently enforced by the bond gra...
Pieter J. L. Cuijpers, Jan F. Broenink, Pieter J. ...
TC
2002
13 years 7 months ago
The Timewheel Group Communication System
This paper describes a group communication system called the timewheel group communication system that has been designed for a timed asynchronous distributed system model. The tim...
Shivakant Mishra, Christof Fetzer, Flaviu Cristian