Sciweavers

105 search results - page 9 / 21
» CyNC: A method for real time analysis of systems with cyclic...
Sort
View
HICSS
1999
IEEE
78views Biometrics» more  HICSS 1999»
14 years 2 days ago
A Structured Transformation Approach for Legacy Information Systems - A Cash Receipts/Reimbursements Example
Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
Jia-Lang Seng, Wayne Tsai
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
14 years 8 months ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
14 years 8 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
IJISEC
2007
149views more  IJISEC 2007»
13 years 7 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
HPDC
2008
IEEE
13 years 8 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...