Sciweavers

3792 search results - page 178 / 759
» Techniques for Trusted Software Engineering
Sort
View
ESEM
2009
ACM
15 years 10 months ago
Scope error detection and handling concerning software estimation models
Over the last 25+ years, the software community has been searching for the best models for estimating variables of interest (e.g., cost, defects, and fault proneness). However, li...
Salvatore Alessandro Sarcià, Victor R. Basi...
SCAM
2007
IEEE
15 years 10 months ago
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes
To encourage open source/libre software development, it is desirable to have tools that can help to identify open source license violations. This paper describes the implementatio...
Arnoldo José Müller Molina, Takeshi Sh...
VMCAI
2004
Springer
15 years 9 months ago
Applying Jlint to Space Exploration Software
Abstract. Java is a very successful programming language which is also becoming widespread in embedded systems, where software correctness is critical. Jlint is a simple but highly...
Cyrille Artho, Klaus Havelund
KBSE
1999
IEEE
15 years 8 months ago
Modular and Incremental Analysis of Concurrent Software Systems
Modularization and abstraction are the keys to practical verification and analysis of large and complex systems. We present in an incremental methodology for the automatic analysi...
Hassen Saïdi
141
Voted
APSEC
1997
IEEE
15 years 8 months ago
Detecting Common Mode Failures in N-Version Software Using Weakest Precondition Analysis
An underlying assumption for N-version programming technique is that independently developed versions would fail in a statistically independent mannel: Howevel; empirical studies ...
Gwang Sik Yoon, Sung Deok Cha, Yong Rae Kwon, Chan...