Sciweavers

3792 search results - page 216 / 759
» Techniques for Trusted Software Engineering
Sort
View
SEKE
2001
Springer
15 years 8 months ago
Temporal Logic Properties of Java Objects
ct 7 Applying finite-state verification techniques to software systems looks attractive because they are capable of detecting very subtle 8 defects in the logic design of these s...
Radu Iosif, Riccardo Sisto
SCOPES
2005
Springer
15 years 10 months ago
Software Synthesis from the Dataflow Interchange Format
Specification, validation, and synthesis are important aspects of embedded systems design. The use of dataflow-based design environments for these purposes is becoming increasingl...
Chia-Jui Hsu, Shuvra S. Bhattacharyya
ICSE
2005
IEEE-ACM
16 years 4 months ago
Efficient and precise dynamic impact analysis using execute-after sequences
As software evolves, impact analysis estimates the potential effects of changes, before or after they are made, by identifying which parts of the software may be affected by such ...
Taweesup Apiwattanapong, Alessandro Orso, Mary Jea...
FCCM
2000
IEEE
122views VLSI» more  FCCM 2000»
15 years 8 months ago
Evaluating Hardware Compilation Techniques
Hardware compilation techniques which use highlevel programming languages to describe and synthesize hardware are gaining popularity. They are especially useful for reconfigurable...
Markus Weinhardt, Wayne Luk
ISSTA
2006
ACM
15 years 10 months ago
Application of automated environment generation to commercial software
Model checking can be an effective technique for detecting concurrency-related errors in software systems. However, due to scalability issues, to handle industrial-strength softw...
Oksana Tkachuk, Sreeranga P. Rajan