Sciweavers

725 search results - page 58 / 145
» Escape Analysis for Java
Sort
View
JCIT
2010
152views more  JCIT 2010»
13 years 2 months ago
Novel MicroRNAs and Targets Prediction in PRRS Virus Genome
In this paper, 4 microRNAs and their targets were predicted through a de novo prediction procedure in the genome of Porcine Reproductive and Respiratory Syndrome virus. Through cl...
Zhenlin Wei
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
12 years 11 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
JASIS
2011
110views more  JASIS 2011»
12 years 10 months ago
A material history of bits
In both the popular press and scholarly research, digital information is persistently discussed in terms that imply its immateriality. In this characterization, the digital derive...
Jean-François Blanchette
SCAM
2008
IEEE
14 years 2 months ago
Exploiting the Correspondence between Micro Patterns and Class Names
This paper argues that semantic information encoded in natural language identifiers is a largely neglected resource for program analysis. First we show that words in Java class n...
Jeremy Singer, Chris C. Kirkham
JIT
1999
Springer
123views Database» more  JIT 1999»
14 years 1 hour ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm