Sciweavers

1412 search results - page 88 / 283
» The Value of Outsourced Software
Sort
View
SIGSOFT
2004
ACM
14 years 9 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
SIGSOFT
2010
ACM
13 years 6 months ago
Representation dependence testing using program inversion
The definition of a data structure may permit many different concrete representations of the same logical content. A (client) program that accepts such a data structure as input i...
Aditya Kanade, Rajeev Alur, Sriram K. Rajamani, Ga...
XPU
2010
Springer
13 years 7 months ago
Extreme Product Line Engineering - Refactoring for Variability: A Test-Driven Approach
Software product lines - families of similar but not identical software products - need to address the issue of feature variability. That is, a single feature might require various...
Yaser Ghanam, Frank Maurer
CODES
2002
IEEE
14 years 1 months ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
COMPSYSTECH
2011
12 years 8 months ago
Encoding watermark numbers as cographs using self-inverting permutations
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
Maria Chroni, Stavros D. Nikolopoulos