Sciweavers

3792 search results - page 181 / 759
» Techniques for Trusted Software Engineering
Sort
View
ISSRE
2000
IEEE
15 years 8 months ago
Criteria for Testing Polymorphic Relationships
The emphasis in object-oriented programs is on defining abstractions that have both state and behavior. This emphasis causes a shift in focus from software units to the way softw...
Roger T. Alexander, A. Jefferson Offutt
155
Voted
ISORC
2005
IEEE
15 years 9 months ago
Model-Checking of Component-Based Event-Driven Real-Time Embedded Software
As complexity of real-time embedded software grows, it is desirable to use formal verification techniques to achieve a high level of assurance. We discuss application of model-ch...
Zonghua Gu, Kang G. Shin
CASCON
2000
119views Education» more  CASCON 2000»
15 years 5 months ago
Efficient mapping of software system traces to architectural views
Information about a software system's execution can help a developer with many tasks, including software testing, performance tuning, and program understanding. In almost all...
Robert J. Walker, Gail C. Murphy, Jeffrey Steinbok...
LCTRTS
2007
Springer
15 years 10 months ago
Tetris: a new register pressure control technique for VLIW processors
The run-time performance of VLIW (very long instruction word) microprocessors depends heavily on the effectiveness of its associated optimizing compiler. Typical VLIW compiler pha...
Weifeng Xu, Russell Tessier
SOFTVIS
2010
ACM
15 years 2 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl