Sciweavers

3792 search results - page 109 / 759
» Techniques for Trusted Software Engineering
Sort
View
ICSM
2007
IEEE
15 years 10 months ago
Re-computing Coverage Information to Assist Regression Testing
This paper presents a technique that leverages an existing regression test-selection algorithm to compute accurate, updated coverage data on a version of the software, Pi+1, witho...
Pavan Kumar Chittimalli, Mary Jean Harrold
136
Voted
KBSE
2007
IEEE
15 years 10 months ago
Towards supporting awareness of indirect conflicts across software configuration management workspaces
Workspace awareness techniques have been proposed to enhance the effectiveness of software configuration management systems in coordinating parallel work. These techniques share i...
Anita Sarma, Gerald Bortis, André van der H...
SCAM
2008
IEEE
15 years 10 months ago
Fast and Precise Points-to Analysis
—Many software engineering applications require points-to analysis. Client applications range from optimizing compilers to program development and testing environments to reverse...
Jonas Lundberg, Tobias Gutzmann, Welf Löwe
111
Voted
AVI
2006
15 years 5 months ago
Bubble radar: efficient pen-based interaction
The rapid increase in display sizes and resolutions has led to the re-emergence of many pen-based interaction systems like tabletop and wall display environments. Pointing in thes...
Dzmitry Aliakseyeu, Miguel A. Nacenta, Sriram Subr...
135
Voted
CAV
2009
Springer
212views Hardware» more  CAV 2009»
16 years 4 months ago
Beaver: Engineering an Efficient SMT Solver for Bit-Vector Arithmetic
We present the key ideas in the design and implementation of Beaver, an SMT solver for quantifier-free finite-precision bit-vector logic (QF BV). Beaver uses an eager approach, enc...
Susmit Jha, Rhishikesh Limaye, Sanjit A. Seshia