Sciweavers

2957 search results - page 551 / 592
» Code analysis and CS-XML
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 21 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ASPLOS
1989
ACM
14 years 15 days ago
Architecture and Compiler Tradeoffs for a Long Instruction Word Microprocessor
A very long instruction word (VLIW) processorexploits parallelism by controlling multiple operations in a single instruction word. This paper describes the architecture and compil...
Robert Cohn, Thomas R. Gross, Monica S. Lam, P. S....
AOSD
2007
ACM
14 years 14 days ago
SCoPE: an AspectJ compiler for supporting user-defined analysis-based pointcuts
This paper proposes an approach called SCoPE, which supports user-defined analysis-based pointcuts in aspect-oriented programming (AOP) languages. The advantage of our approach is...
Tomoyuki Aotani, Hidehiko Masuhara
ESCIENCE
2007
IEEE
14 years 10 days ago
CDF Monte Carlo Production on LCG Grid via LcgCAF Portal
The improvements of the luminosity of the Tevatron Collider require large increases in computing requirements for the CDF experiment which has to be able to increase proportionally...
Gabriele Compostella, Donatella Lucchesi, Simone P...
CASES
2006
ACM
14 years 6 days ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...