Sciweavers

1199 search results - page 90 / 240
» Software Verification and Software Engineering a Practitione...
Sort
View
144
Voted
ICSE
2008
IEEE-ACM
16 years 5 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
ICSE
2007
IEEE-ACM
16 years 4 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
PROFES
2004
Springer
15 years 9 months ago
Requirements Prioritization Challenges in Practice
Requirements prioritization is recognized as an important activity in product development. In this paper, we describe the current state of requirements prioritization practices in ...
Laura Lehtola, Marjo Kauppinen, Sari Kujala
SIGSOFT
2008
ACM
16 years 5 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
PLDI
2009
ACM
16 years 5 months ago
A decision procedure for subset constraints over regular languages
Reasoning about string variables, in particular program inputs, is an important aspect of many program analyses and testing frameworks. Program inputs invariably arrive as strings...
Pieter Hooimeijer, Westley Weimer