Sciweavers

933 search results - page 77 / 187
» How compilers and tools differ for embedded systems
Sort
View
EXACT
2007
15 years 5 months ago
Designing Explanation Aware Systems: The Quest for Explanation Patterns
Systems in general, and intelligent systems in particular, need to be able to explain their behaviour to their users or partners. Previously, a number of different user goals that...
Jörg Cassens, Anders Kofod-Petersen
CC
2006
Springer
129views System Software» more  CC 2006»
15 years 6 months ago
Loop Transformations in the Ahead-of-Time Optimization of Java Bytecode
Abstract. Loop optimizations such as loop unrolling, unfolding and invariant code motion have long been used in a wide variety of compilers to improve the running time of applicati...
Simon Hammond, David Lacey
IFM
2010
Springer
183views Formal Methods» more  IFM 2010»
15 years 22 days ago
Certified Absence of Dangling Pointers in a Language with Explicit Deallocation
Safe is a first-order eager functional language with facilities for programmer controlled destruction and copying of data structures. It provides also regions, i.e. disjoint parts...
Javier de Dios, Manuel Montenegro, Ricardo Pe&ntil...
IJMMS
1998
153views more  IJMMS 1998»
15 years 2 months ago
Brahms: simulating practice for work systems design
A continuing problem in business today is the design of human-computer systems that respect how work actually gets done. The overarching context of work consists of activities, wh...
William J. Clancey, Patricia Sachs, Maarten Sierhu...
ACSAC
2009
IEEE
15 years 9 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu