Výsledky vyhledávání - "Theory of computation Semantics and reasoning"
-
1
Improving Fault Localization by Integrating Value and Predicate Based Causal Inference Techniques
ISBN: 1665402962, 9781665402965ISSN: 1558-1225Vydáno: IEEE 01.05.2021Vydáno v Proceedings / International Conference on Software Engineering (01.05.2021)“…/failure, and so they are subject to confounding bias that distorts the scores they produce…”
Získat plný text
Konferenční příspěvek -
2
A Generalized Approach for Solving Web Form Constraints
ISSN: 2643-1572Vydáno: ACM 27.10.2024Vydáno v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“… Filling out forms automatically is challenging, as form fields would typically be subject to specific constraints that prevent entry of invalid data…”
Získat plný text
Konferenční příspěvek -
3
Verifying Determinism in Sequential Programs
ISBN: 1665412194, 9781665412193Vydáno: IEEE 01.05.2021Vydáno v 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) (01.05.2021)“…When a program is nondeterministic, it is difficult to test and debug. Nondeterminism occurs even in sequential programs iterating over the elements of a hash…”
Získat plný text
Konferenční příspěvek -
4
Leveraging Propagated Infection to Crossfire Mutants
ISSN: 1558-1225Vydáno: IEEE 26.04.2025Vydáno v Proceedings / International Conference on Software Engineering (26.04.2025)“… We conducted a study and found that many such surviving mutants (up to 84% for the subjects of our study…”
Získat plný text
Konferenční příspěvek -
5
SemFix: program repair via semantic analysis
ISBN: 1467330760, 9781467330763Vydáno: Piscataway, NJ, USA IEEE Press 18.05.2013Vydáno v Proceedings of the 2013 International Conference on Software Engineering (18.05.2013)“…Debugging consumes significant time and effort in any major software development project. Moreover, even after the root cause of a bug is identified, fixing…”
Získat plný text
Konferenční příspěvek -
6
SBFT Tool Competition 2024 - Python Test Case Generation Track
Vydáno: ACM 14.04.2024Vydáno v 2024 IEEE/ACM International Workshop on Search-Based and Fuzz Testing (SBFT) (14.04.2024)“… budget of 400 seconds. We considered one configuration of each tool for each test subject and evaluated the tools…”
Získat plný text
Konferenční příspěvek -
7
Using symbolic evaluation to understand behavior in configurable software systems
ISBN: 9781605587196, 1605587192ISSN: 0270-5257Vydáno: New York, NY, USA ACM 01.05.2010Vydáno v 2010 ACM/IEEE 32nd International Conference on Software Engineering (01.05.2010)“… We used symbolic evaluation to discover how the settings of run-time configuration options affect line, basic block, edge, and condition coverage for our subjects under a given test suite…”
Získat plný text
Konferenční příspěvek -
8
Game Semantics for Type Soundness
ISSN: 1043-6871Vydáno: IEEE 01.07.2015Vydáno v 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (01.07.2015)“… Game semantics allows us to define the meaning of both expressions and types in the same domain which enables an interesting alternative to subject reduction for proving type soundness…”
Získat plný text
Konferenční příspěvek -
9
Precimonious: tuning assistant for floating-point precision
ISBN: 9781450323789, 1450323782ISSN: 2167-4329Vydáno: New York, NY, USA ACM 17.11.2013Vydáno v 2013 SC - International Conference for High Performance Computing, Networking, Storage and Analysis (SC) (17.11.2013)“… Precimonious performs a search on the types of the floating-point program variables trying to lower their precision subject to accuracy constraints and performance goals…”
Získat plný text
Konferenční příspěvek -
10
SMT-based bounded model checking for multi-threaded software in embedded systems
ISBN: 9781605587196, 1605587192ISSN: 0270-5257Vydáno: New York, NY, USA ACM 01.05.2010Vydáno v 2010 ACM/IEEE 32nd International Conference on Software Engineering (01.05.2010)“…The transition from single-core to multi-core processors has made multi-threaded software an important subject over the last years in computer-aided verification…”
Získat plný text
Konferenční příspěvek -
11
Strategies for product-line verification: case studies and experiments
ISBN: 1467330760, 9781467330763Vydáno: Piscataway, NJ, USA IEEE Press 18.05.2013Vydáno v Proceedings of the 2013 International Conference on Software Engineering (18.05.2013)“… We have collected and prepared six product lines as subject systems for experimentation. Furthermore, we have developed a model-checking tool chain for C-based and Java-based…”
Získat plný text
Konferenční příspěvek -
12
Dynamic shape analysis of program heap using graph spectra (NIER track)
ISBN: 9781450304450, 1450304451Vydáno: New York, NY, USA ACM 21.05.2011Vydáno v Proceedings of the 33rd International Conference on Software Engineering (21.05.2011)“… Initial experiments show that this approach can generate meaningful summaries for a range of subject structures…”
Získat plný text
Konferenční příspěvek -
13
Predicting common web application vulnerabilities from input validation and sanitization code patterns
ISBN: 1450312047, 9781450312042Vydáno: New York, NY, USA ACM 03.09.2012Vydáno v 27th IEEE/ACM International Conference on Automated Software Engineering (ASE) : proceedings, September 3-7, 2012, Essen, Germany (03.09.2012)“…Software defect prediction studies have shown that defect predictors built from static code attributes are useful and effective. On the other hand, to mitigate…”
Získat plný text
Konferenční příspěvek -
14
Generating Subject-Oriented Process Models from Ad-Hoc Interactions of Cognitive Agents
Vydáno: IEEE 01.08.2014Vydáno v 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) (01.08.2014)“… This paper presents an approach for generating subject-oriented process models from the cognitive models used by agents while interacting…”
Získat plný text
Konferenční příspěvek -
15
Intrusion detection using signatures extracted from execution profiles
ISBN: 9781424437252, 1424437253Vydáno: Washington, DC, USA IEEE Computer Society 19.05.2009Vydáno v 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)“…An application based intrusion detection system is a security mechanism designed to detect malicious behavior that could compromise the security of a software…”
Získat plný text
Konferenční příspěvek -
16
Local and On-the-fly Choreography-based Web Service Composition
ISBN: 0769530265, 9780769530260Vydáno: Washington, DC, USA IEEE Computer Society 02.11.2007Vydáno v Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (02.11.2007)“… to the desired required functionality. Such a technique is subject to state-space explosion. In light of this, we have developed a tabled-logic programming technique…”
Získat plný text
Konferenční příspěvek -
17
Graphical strategies to convey functional relationships in the human brain: a case study
ISBN: 078037200X, 9780780372009Vydáno: Washington, DC, USA IEEE Computer Society 21.10.2001Vydáno v Proceedings of the conference on Visualization '01 (21.10.2001)“… Typically, researchers report their findings by listing those regions which show significant statistical activity in a group of subjects under some experimental condition or task…”
Získat plný text
Konferenční příspěvek

