Sciweavers

1222 search results - page 233 / 245
» Verifying a File System Implementation
Sort
View
PLDI
2010
ACM
14 years 14 days ago
Adversarial memory for detecting destructive races
Multithreaded programs are notoriously prone to race conditions, a problem exacerbated by the widespread adoption of multi-core processors with complex memory models and cache coh...
Cormac Flanagan, Stephen N. Freund
SAINT
2002
IEEE
14 years 9 days ago
Service Emergence based on Relationship among Self-Organizing Entities
In this paper, we describe the Jack-in-the-Net (Ja-Net) architecture for adaptive services in a large scale, open network environment. Using biologically inspired concepts, Ja-Net...
Tomoko Itao, Tetsuya Nakamura, Masato Matsuo, Tats...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Symbolic mining of temporal specifications
Program specifications are important in many phases of the software development process, but they are often omitted or incomplete. An important class of specifications takes the f...
Mark Gabel, Zhendong Su
EUROSYS
2009
ACM
14 years 4 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle usersā€™ conļ¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
ISSTA
2006
ACM
14 years 1 months ago
Architecture-based testing using goals and plans
This paper presents a speciļ¬cation-based testing approach that compares software speciļ¬cations deļ¬ned at diļ¬€erent f abstraction, e.g. architecture and implementation, agai...
Kristina Winbladh, Thomas A. Alspaugh, Hadar Ziv, ...