LEADER 04017nam 2200601Ia 450 001 9910483771603321 005 20200520144314.0 010 $a1-280-38587-1 010 $a9786613563798 010 $a3-642-12029-6 024 7 $a10.1007/978-3-642-12029-9 035 $a(CKB)2670000000010122 035 $a(SSID)ssj0000399483 035 $a(PQKBManifestationID)11245776 035 $a(PQKBTitleCode)TC0000399483 035 $a(PQKBWorkID)10376640 035 $a(PQKB)10037201 035 $a(DE-He213)978-3-642-12029-9 035 $a(MiAaPQ)EBC3065140 035 $a(PPN)149059795 035 $a(EXLCZ)992670000000010122 100 $a20100203d2010 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFundamental Approaches to Software Engineering $e13th international conference, FASE 2010 ; held as part of the joint European conferences on Theory and Practice of Software, ETAPS 2010 ; Paphos, Cyprus, March 20-28, 2010. Proceedings /$fDavid S. Rosenblum, Gabriele Taentzer (eds.) 205 $a1st ed. 2010. 210 $aNew York $cSpringer$d2010 215 $a1 online resource (XIII, 383 p. 127 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6013 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-12028-8 327 $aInvited Speaker -- Why the Virtual Nature of Software Makes It Ideal for Search Based Optimization -- Model Transformation -- A Formalisation of Constraint-Aware Model Transformations -- Formal Real-Time Model Transformations in MOMENT2 -- Reusing Model Transformations While Preserving Properties -- Software Evolution -- Are Popular Classes More Defect Prone? -- Operation-Based, Fine-Grained Version Control Model for Tree-Based Representation -- A Method for Analyzing Code Homology in Genealogy of Evolving Software -- Dynamic Resource Scheduling in Disruption-Prone Software Development Environments -- Graph Transformation -- Incremental Service Composition Based on Partial Matching of Visual Contracts -- Formal Analysis and Verification of Self-Healing Systems -- Stochastic Simulation of Graph Transformation Systems -- Modeling Concepts -- Prescriptive Semantics for Big-Step Modelling Languages -- A Modular Model Composition Technique -- A Verifiable Modeling Approach to Configurable Role-Based Access Control -- Incremental Consistency Checking of Dynamic Constraints -- Verification -- Proving Consistency and Completeness of Model Classes Using Theory Interpretation -- Automatic Cross Validation of Multiple Specifications: A Case Study -- An Automata-Theoretic Approach to Hardware/Software Co-verification -- Program Analysis -- Shape Refinement through Explicit Heap Analysis -- Memory Leaks Detection in Java by Bi-abductive Inference -- Analyzing the Impact of Change in Multi-threaded Programs -- Testing and Debugging -- Evaluating Ordering Heuristics for Dynamic Partial-Order Reduction Techniques -- A Lightweight and Portable Approach to Making Concurrent Failures Reproducible -- Efficient Runtime Assertion Checking of Assignable Clauses with Datagroups -- Performance Modeling and Analysis -- Performance Modeling and Analysis of Context-Aware Mobile Software Systems -- A Process to Effectively Identify ?Guilty? Performance Antipatterns. 410 0$aLecture notes in computer science ;$v6013. 517 3 $aFASE 2010 517 3 $aETAPS 2010 606 $aSoftware engineering$vCongresses 606 $aComputer software$vCongresses 615 0$aSoftware engineering 615 0$aComputer software 676 $a005.1 701 $aRosenblum$b David Samuel$01761208 701 $aTaentzer$b Gabriele$01761209 712 12$aETAPS 2008$d(13th :$f2010 :$ePaphos, Cyprus) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483771603321 996 $aFundamental Approaches to Software Engineering$94200508 997 $aUNINA