Sciweavers

1210 search results - page 170 / 242
» Formal Techniques for Java Programs
Sort
View
KBSE
2009
IEEE
14 years 2 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
ECR
2006
107views more  ECR 2006»
13 years 7 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
AMAST
2008
Springer
13 years 9 months ago
Towards an Efficient Implementation of Tree Automata Completion
Term Rewriting Systems (TRSs) are now commonly used as a modeling language for applications. In those rewriting based models, reachability analysis, i.e. proving or disproving that...
Emilie Balland, Yohan Boichut, Thomas Genet, Pierr...
EUROMED
2010
13 years 6 months ago
Modeling Procedural Knowledge: A Generative Modeler for Cultural Heritage
Within the last few years generative modeling techniques have gained attention especially in the context of cultural heritage. As a generative model describes a rather ideal object...
Christoph Schinko, Martin Strobl, Torsten Ullrich,...
ICFP
2004
ACM
14 years 7 months ago
Verification of safety properties for concurrent assembly code
Concurrency, as a useful feature of many modern programming languages and systems, is generally hard to reason about. Although existing work has explored the verification of concu...
Dachuan Yu, Zhong Shao