Sciweavers

427 search results - page 78 / 86
» Improving software security with a C pointer analysis
Sort
View
IEEEPACT
2006
IEEE
14 years 1 months ago
Whole-program optimization of global variable layout
On machines with high-performance processors, the memory system continues to be a performance bottleneck. Compilers insert prefetch operations and reorder data accesses to improve...
Nathaniel McIntosh, Sandya Mannarswamy, Robert Hun...
CIKM
1999
Springer
13 years 12 months ago
Indexing and Retrieval of Scientific Literature
The web hasgreatly improved accessto scientific literature. However, scientific articles on the web are largely disorganized, with research articles being spreadacrossarchive site...
Steve Lawrence, Kurt D. Bollacker, C. Lee Giles
TSE
2002
99views more  TSE 2002»
13 years 7 months ago
Recovering Traceability Links between Code and Documentation
Software system documentation is almost always expressed informally in natural language and free text. Examples include requirement specifications, design documents, manual pages, ...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...
CEJCS
2011
80views more  CEJCS 2011»
12 years 7 months ago
Evaluating distributed real-time and embedded system test correctness using system execution traces
: Effective validation of distributed real-time and embedded (DRE) system quality-of-service (QoS) properties (e.g., event prioritization, latency, and throughput) requires testin...
James H. Hill, Pooja Varshneya, Douglas C. Schmidt
EMSOFT
2003
Springer
14 years 24 days ago
Rate Monotonic vs. EDF: Judgment Day
Since the first results published in 1973 by Liu and Layland on the Rate Monotonic (RM) and Earliest Deadline First (EDF) algorithms, a lot of progress has been made in the schedu...
Giorgio C. Buttazzo