Sciweavers

1589 search results - page 246 / 318
» Constraints with Variables' Annotations
Sort
View
PLDI
2000
ACM
14 years 2 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
CARDIS
2006
Springer
114views Hardware» more  CARDIS 2006»
14 years 1 months ago
A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods
Ahead-of-Time and Just-in-Time compilation are common ways to improve runtime performances of restrained systems like Java Card by turning critical Java methods into native code. H...
Alexandre Courbot, Mariela Pavlova, Gilles Grimaud...
ESOP
2006
Springer
14 years 1 months ago
Inference of User-Defined Type Qualifiers and Qualifier Rules
Abstract. In previous work, we described a new approach to supporting userdefined type qualifiers, which augment existing types to specify and check additional properties of intere...
Brian Chin, Shane Markstrum, Todd D. Millstein, Je...
DAGSTUHL
2003
13 years 11 months ago
Pattern Synthesis from Multiple Scenarios for Parameterized Real-Time UML Models
Abstract. The continuing trend towards more sophisticated technical applications results in an increasing demand for high quality software for complex, safety-critical systems. Des...
Holger Giese, Florian Klein, Sven Burmester
CASCON
1997
85views Education» more  CASCON 1997»
13 years 11 months ago
Fast detection of communication patterns in distributed executions
Understanding distributed applications is a tedious and di cult task. Visualizations based on process-time diagrams are often used to obtain a better understanding of the executio...
Thomas Kunz, Michiel F. H. Seuren