Sciweavers

661 search results - page 101 / 133
» What Can We Expect from Program Verification
Sort
View
AIPS
2007
13 years 10 months ago
Robust Local Search and Its Application to Generating Robust Schedules
In this paper, we propose an extended local search framework to solve combinatorial optimization problems with data uncertainty. Our approach represents a major departure from sce...
Hoong Chuin Lau, Thomas Ou, Fei Xiao
CHI
1999
ACM
13 years 12 months ago
Implementing Interface Attachments Based on Surface Representations
This paper describes an architecture for supporting interface attuchments- small interactive programs which are designed to augment the functionality of other applications. This a...
Dan R. Olsen, Scott E. Hudson, Thom Verratti, Jere...
DIMVA
2008
13 years 9 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
ECOOP
1999
Springer
13 years 11 months ago
Visualizing Reference Patterns for Solving Memory Leaks in Java
Many Java programmers believe they do not have to worry about memory management because of automatic garbage collection. In fact, many Java programs run out of memory unexpectedly ...
Wim De Pauw, Gary Sevitsky
ENTCS
2002
143views more  ENTCS 2002»
13 years 7 months ago
Collecting Statistics over Runtime Executions
Abstract. We present an extension to linear-time temporal logic (LTL) that combines the temporal specification with the collection of statistical data. By collecting statistics ove...
Bernd Finkbeiner, Sriram Sankaranarayanan, Henny S...