Sciweavers

1448 search results - page 28 / 290
» From Requirements to Code Revisited
Sort
View
INFORMATICALT
2000
120views more  INFORMATICALT 2000»
13 years 7 months ago
Mobile Code Alternatives for Secure Environments
Growing popularity of the mobile code requires to consider various aspects related to its security. In the aviation industry there is a case when additional information needs to be...
Algirdas Pakstas, Igor Shagaev
ATAL
2005
Springer
14 years 1 months ago
From concepts to agents: towards a framework for multi-agent system modelling
Whilst tools assist the various tasks required to develop a multi-agent system (MAS), yet there still remains a gap between the generation of MAS models and program code. AUML dev...
Richard Hill, Simon Polovina, Martin D. Beer
PLDI
1999
ACM
13 years 12 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ECAI
2004
Springer
14 years 1 months ago
A Syntactical Approach to Revision
The aim of this article is to revisit Dalal’s operator for belief revision. Dalal has proposed a technique for revising belief bases based on the minimization of a distance betw...
Guilherme Bittencourt, Laurent Perrussel, Jerusa M...