Sciweavers

1186 search results - page 184 / 238
» On Designing an Experiment to Evaluate a Reverse Engineering...
Sort
View
ISSTA
2009
ACM
14 years 2 months ago
Run-time conformance checking of mobile and distributed systems using executable models
This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera — a novel, high-level language supporting the descri...
Ahmad A. Saifan, Ernesto Posse, Jürgen Dingel
ISSTA
2004
ACM
14 years 3 months ago
Faster constraint solving with subtypes
Constraints in predicate or relational logic can be translated into boolean logic and solved with a SAT solver. For faster solving, it is common to exploit the typing of predicate...
Jonathan Edwards, Daniel Jackson, Emina Torlak, Vi...
ICSE
1998
IEEE-ACM
14 years 2 months ago
Modeling and Analysis of a Virtual Reality System with Time Petri Nets
The design, implementation, and testing of virtual environments is complicated by the concurrency and realtime features of these systems. Therefore, the development of formal meth...
Rajesh Mascarenhas, Dinkar Karumuri, Ugo A. Buy, R...
CHI
2007
ACM
14 years 2 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
GCSE
2000
Springer
14 years 1 months ago
Generic Components: A Symbiosis of Paradigms
Software reuse and especially the paradigm of software components are promising approaches to increase the efficiency of software development. One of the basic problems of software...
Martin Becker