Sciweavers

4722 search results - page 831 / 945
» Representation-independent program analysis
Sort
View
CCS
2008
ACM
13 years 10 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ISSTA
2010
ACM
13 years 10 months ago
Causal inference for statistical fault localization
This paper investigates the application of causal inference methodology for observational studies to software fault localization based on test outcomes and profiles. This methodo...
George K. Baah, Andy Podgurski, Mary Jean Harrold
ATAL
2005
Springer
13 years 10 months ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee
CMSB
2008
Springer
13 years 9 months ago
Analyzing a Discrete Model of Aplysia Central Pattern Generator
We present a discrete formal model of the central pattern generator (CPG) located in the buccal ganglia of Aplysia that is responsible for mediating the rhythmic movements of its f...
Ashish Tiwari, Carolyn L. Talcott
EUROPAR
2008
Springer
13 years 9 months ago
Parametric Studies in Eclipse with TAU and PerfExplorer
Abstract. With support for C/C++, Fortran, MPI, OpenMP, and performance tools, the Eclipse integrated development environment (IDE) is a serious contender as a programming environm...
Kevin A. Huck, Wyatt Spear, Allen D. Malony, Samee...