Sciweavers

1407 search results - page 208 / 282
» Using Use Cases in Executable Z
Sort
View
193
Voted
ICDE
2012
IEEE
256views Database» more  ICDE 2012»
13 years 6 months ago
Micro-Specialization in DBMSes
Abstract—Relational database management systems are general in the sense that they can handle arbitrary schemas, queries, and modifications; this generality is implemented using...
Rui Zhang, Richard T. Snodgrass, Saumya Debray
130
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
An empirical study of the effects of test-suite reduction on fault localization
Fault-localization techniques that utilize information about all test cases in a test suite have been presented. These techniques use various approaches to identify the likely fau...
Yanbing Yu, James A. Jones, Mary Jean Harrold
122
Voted
SIGSOFT
2004
ACM
16 years 4 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
ESOP
2010
Springer
16 years 1 months ago
Generative Operational Semantics for Relaxed Memory Models
The specification of the Java Memory Model (JMM) is phrased in terms of acceptors of execution sequences rather than the standard generative view of operational semantics. This cre...
Radha Jagadeesan, Corin Pitcher and James Riely
153
Voted
CSFW
2007
IEEE
15 years 10 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna