Sciweavers

173 search results - page 10 / 35
» Predicting the severity of a reported bug
Sort
View
CAV
2009
Springer
116views Hardware» more  CAV 2009»
14 years 8 months ago
Meta-analysis for Atomicity Violations under Nested Locking
Abstract. We study the problem of determining, given a run of a concurrent program, whether there is any alternate execution of it that violates atomicity, where atomicity is defin...
Azadeh Farzan, P. Madhusudan, Francesco Sorrentino
ICSE
2008
IEEE-ACM
14 years 8 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
POPL
2005
ACM
14 years 8 months ago
Mutatis mutandis: safe and predictable dynamic software updating
Dynamic software updates can be used to fix bugs or add features to a running program without downtime. Essential for some applications and convenient for others, low-level dynami...
Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman,...

Presentation
2959views
14 years 3 months ago
How to Come Up with New Research Ideas in Computer Vision
Computer vision has been studied for more than 40 years. Due to the increasingly diverse and rapidly developed topics in vision and the related fields (e.g., machine learning, sign...
Jia-Bin Huang
AIMS
2009
Springer
14 years 2 months ago
NETCONF Interoperability Testing
The IETF has developed a network configuration management protocol called NETCONF which was published as proposed standard in 2006. The NETCONF protocol provides mechanisms to in...
Ha Manh Tran, Iyad Tumar, Jürgen Schönw&...