Sciweavers

486 search results - page 22 / 98
» Sound Methods and Effective Tools for Engineering Modeling a...
Sort
View
166
Voted
WCRE
1999
IEEE
15 years 7 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
119
Voted
AINA
2007
IEEE
15 years 7 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
ICSE
2008
IEEE-ACM
16 years 3 months ago
PLURAL: checking protocol compliance under aliasing
Enforcing compliance to API usage protocols is notoriously hard due to possible aliasing of objects through multiple references. In previous work we proposed a sound, modular appr...
Kevin Bierhoff, Jonathan Aldrich
ICSE
2008
IEEE-ACM
16 years 4 months ago
The effect of the number of inspectors on the defect estimates produced by capture-recapture models
Inspections can be made more cost-effective by using capturerecapture methods to estimate post-inspection defects. Previous capture-recapture studies of inspections used relativel...
Gursimran Singh Walia, Jeffrey C. Carver, Nachiapp...
ICFEM
2004
Springer
15 years 8 months ago
Memory-Model-Sensitive Data Race Analysis
Abstract. We present a “memory-model-sensitive” approach to validating correctness properties for multithreaded programs. Our key insight is that by specifying both the inter-t...
Yue Yang, Ganesh Gopalakrishnan, Gary Lindstrom