Sciweavers

667 search results - page 85 / 134
» Exceptions for Algorithmic Skeletons
Sort
View
ICTAC
2010
Springer
13 years 6 months ago
Mechanized Verification with Sharing
We consider software verification of imperative programs by theorem proving in higher-order separation logic. Of particular interest are the difficulties of encoding and reasoning ...
J. Gregory Malecha, Greg Morrisett
ICSE
2004
IEEE-ACM
14 years 8 months ago
Static Checking of Dynamically Generated Queries in Database Applications
Many data-intensive applications dynamically construct queries in response to client requests and execute them. Java servlets, e.g., can create string representations of SQL queri...
Carl Gould, Zhendong Su, Premkumar T. Devanbu
PERCOM
2009
ACM
14 years 3 months ago
Delaunay-Triangulation Based Complete Coverage in Wireless Sensor Networks
—One of the major issues in a wireless sensor network (WSN) is how to cover an interested area. In this paper, we consider the area coverage problem for variable sensing radii WS...
Chinh T. Vu, Yingshu Li
CW
2008
IEEE
14 years 3 months ago
Keyframe Based Video Object Deformation
—This paper proposes a keyframe-based video object editing scheme for automatic object shape deformation. Except for object segmentation, several technologies are developed in th...
Yanlin Weng, Weiwei Xu, Shichao Hu, Jun Zhang, Bai...
ICC
2007
IEEE
14 years 3 months ago
Reducing the Size of Rule Set in a Firewall
— A firewall’s complexity is known to increase with the size of its rule set. Complex firewalls are more likely to have configuration errors which cause security loopholes. ...
MyungKeun Yoon, Shigang Chen, Zhan Zhang