Software faults that evade testing can have serious consequences, not sparing economic damages or human losses. Recent developments towards multi-core processors have led to the increased usage of concurrency to utilize the hardwa...
Software faults that evade testing can have serious consequences, not sparing economic damages or human losses. Recent developments towards multi-core processors have led to the increased usage of concurrency to utilize the hardware's full potential. While helping to make software ever more capable, this further complicates the already laborious and time-consuming challenge of software testing. Not only tremendously increasing the computational effort needed to automatically find concurrency bugs, such errors prove to be especially tricky to find and fix even for professional software developers. Yet, currently the market does not provide a satisfying solution to addresses this challenge. The PoC project SAFE, however, offers a comprehensive, rigorous, and automated methodology for systematically finding errors in concurrent software. Based on state-of-the-art technology, an academic prototype developed as part of the ERC CoG SYMBIOSYS project has established the algorithmic applicability of the core methodology, already finding a number of bugs in real-world concurrent software. The project includes 5 tasks: (1) To establish the technical requirements for transitioning the prototype into a product, the required engineering tasks will be defined. (2) To complete core features and laying technical groundwork for commercialization, the technology will be engineered to serve a wider range of software. (3) To secure the exploitation strategy through a consolidated IP position, the legal framework for license agreements and IPR strategy will be laid. (4) To raise awareness for SAFE, the market niche to be targeted will be identified by completing a market analysis, including an account of the competitive landscape. (5) To validate commercial feasibility and create a business plan for exploitation beyond SAFE, various exploitation strategies will be evaluated, such as the foundation of a Softw.-as-a-Service spin-off; resulting in a business plan and a feasibility report.ver más
Seleccionando "Aceptar todas las cookies" acepta el uso de cookies para ayudarnos a brindarle una mejor experiencia de usuario y para analizar el uso del sitio web. Al hacer clic en "Ajustar tus preferencias" puede elegir qué cookies permitir. Solo las cookies esenciales son necesarias para el correcto funcionamiento de nuestro sitio web y no se pueden rechazar.
Cookie settings
Nuestro sitio web almacena cuatro tipos de cookies. En cualquier momento puede elegir qué cookies acepta y cuáles rechaza. Puede obtener más información sobre qué son las cookies y qué tipos de cookies almacenamos en nuestra Política de cookies.
Son necesarias por razones técnicas. Sin ellas, este sitio web podría no funcionar correctamente.
Son necesarias para una funcionalidad específica en el sitio web. Sin ellos, algunas características pueden estar deshabilitadas.
Nos permite analizar el uso del sitio web y mejorar la experiencia del visitante.
Nos permite personalizar su experiencia y enviarle contenido y ofertas relevantes, en este sitio web y en otros sitios web.