• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 38
Next 10 →

Non-Termination Checking for Imperative Programs

by Helga Velroyen
"... Abstract. While termination checking tailored to real-world library code or frameworks has received ever-increasing attention during the last years, the complementary question of disproving termination properties as a means of debugging has largely been ignored so far. We present an approach to auto ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
to automatic non-termination checking that relates to termination checking in the same way as symbolic testing does to program verification. Our method is based on the automated generation of invariants that show that terminating states of a program are unreachable from certain initial states. Such initial

An Initial Experiment in Reverse Engineering Aspects from Existing Applications

by Magiel Bruntink, Arie van Deursen, Tom Tourwé , 2004
"... In this paper, we evaluate the benefits of applying aspectoriented software development techniques in the context of a large-scale industrial embedded software system implementing a number of crosscutting concerns. Additionally, we assess the feasibility of automatically extracting these crosscuttin ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
In this paper, we evaluate the benefits of applying aspectoriented software development techniques in the context of a large-scale industrial embedded software system implementing a number of crosscutting concerns. Additionally, we assess the feasibility of automatically extracting

An Initial Experiment in Reverse Engineering Aspects

by Magiel Bruntink Arie, Arie Van Deursen, Tom Tourwé - In WCRE , 2004
"... In this paper, we evaluate the benefits of applying aspectoriented software development techniques in the context of a large-scale industrial embedded software system implementing a number of crosscutting concerns. Additionally, we assess the feasibility of automatically extracting these crosscuttin ..."
Abstract - Add to MetaCart
In this paper, we evaluate the benefits of applying aspectoriented software development techniques in the context of a large-scale industrial embedded software system implementing a number of crosscutting concerns. Additionally, we assess the feasibility of automatically extracting

Distributed

by Waqaas Munawar, Olaf L, Muhammad Hamad Alizai, Klaus Wehrle, Rwth Aachen
"... Abstract—Wireless Sensor Networks (WSNs) are deployed for long periods of time, during which a need often arises to dynamically reprogram or retask them. An array of solutions has been proposed to this effect, ranging from full image replacement to virtual machines. However, the capabilities of Tiny ..."
Abstract - Add to MetaCart
OS to allow dynamic exchange of components in WSN applications by conserving their modularity during the compilation process. This generates the possibility of incremental adaptation of sensor nodes ’ behavior through partial code replacement. The designed system does not require any alterations

Proceedings of the First NASA Formal Methods Symposium

by Ewen Denney, Dimitra Giannakopoulou, Corina S. Păsăreanu , 2009
"... NFM 2009 is a forum for theoreticians and practitioners from academia and industry, with the goals of identifying challenges and providing solutions to achieving assurance in safety-critical systems. Within NASA, for example, such systems include autonomous robots, separation assurance algorithms fo ..."
Abstract - Add to MetaCart
researchers and engineers, as well as the wider aerospace, safety-critical and formal methods communities. The specific topics covered by NFM 2009 included but were not limited to: formal verification, including theorem proving, model checking, and static analysis; automated testing and simulation techniques

SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING

by Bird Tracking, William P. Bennett, William P., Development, Deployment Of, Mobile Wireless Sensor, William P. Bennett, William P. Bennett, Adviser Mehmet, C. Vuran , 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract - Add to MetaCart
reliable, low-cost monitoring of migratory species. The developed multi-tier architecture yields ecologists with unconventional behavior in-formation not furnished by alternative tracking systems at such a large scale and for a low-cost. The simulation, development and implementation of the Crane

Ad Hoc Networks xxx (2012) xxx–xxx Contents lists available at SciVerse ScienceDirect

by Wei Dong, Chun Chen, Jiajun Bu, Chao Huang
"... journal homepage: www.elsevier.com/locate/adhoc Enabling efficient reprogramming through reduction of executable modules ..."
Abstract - Add to MetaCart
journal homepage: www.elsevier.com/locate/adhoc Enabling efficient reprogramming through reduction of executable modules

hardware and mobile web technology Master of Science Thesis in Programme Computer Systems and Networks

by Tomas Ohlson, Tomas Ohlson , 2013
"... Digitising statistics handling through ..."
Abstract - Add to MetaCart
Digitising statistics handling through

and

by Beta Ziliani, Derek Dreyer, Neelakantan R. Krishnaswami, Aleksandar Nanevski , 2015
"... Effective support for custom proof automation is essential for large-scale interactive proof develop-ment. However, existing languages for automation via tactics either (a) provide no way to specify the behavior of tactics within the base logic of the accompanying theorem prover, or (b) rely on adva ..."
Abstract - Add to MetaCart
Effective support for custom proof automation is essential for large-scale interactive proof develop-ment. However, existing languages for automation via tactics either (a) provide no way to specify the behavior of tactics within the base logic of the accompanying theorem prover, or (b) rely

List of Tables...........................

by Catherine Rose, Mills Olschanowsky, Catherine Rose, Mills Olschanowsky , 2011
"... by ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 38
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University