Sciweavers

725 search results - page 72 / 145
» Escape Analysis for Java
Sort
View
SPC
2005
Springer
14 years 1 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
GI
1998
Springer
13 years 12 months ago
Business Object Facilities - A Comparative Analysis
Rapidlychanging business processes require quick adaption of supportinginformationsystems. Component technologies in general and business objects, in particular seem a promising a...
Wolfgang Emmerich, Ernst Ellmer, Birgit Osterholt,...
ICSE
2007
IEEE-ACM
14 years 7 months ago
SCL: Static Enforcement and Exploration of Developer Intent in Source Code
Developers are often unaware of, or fail to respect, the intentions behind a design due to poor communication of design intent. SCL (Structural Constraint Language) helps develope...
Daqing Hou
ISSTA
2009
ACM
14 years 2 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis
HPCA
2006
IEEE
14 years 8 months ago
Completely verifying memory consistency of test program executions
An important means of validating the design of commercial-grade shared memory multiprocessors is to run a large number of pseudo-random test programs on them. However, when intent...
Chaiyasit Manovit, Sudheendra Hangal