Sciweavers

1629 search results - page 11 / 326
» Infeasible Code Detection
Sort
View
PEPM
2010
ACM
14 years 7 months ago
Clone detection and elimination for Haskell
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code make...
Christopher Brown, Simon Thompson
TCOM
2008
63views more  TCOM 2008»
13 years 10 months ago
A general construction of constrained parity-check codes for optical recording
This paper proposes a general and systematic code design method to efficiently combine constrained codes with parity-check (PC) codes for optical recording. The proposed constraine...
Kui Cai, Kees A. Schouhamer Immink
TACAS
2005
Springer
121views Algorithms» more  TACAS 2005»
14 years 3 months ago
FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs
Abstract. We present the FocusCheck model-checking tool for the verification and easy debugging of assertion violations in sequential C programs. The main functionalities of the t...
Curtis W. Keller, Diptikalyan Saha, Samik Basu, Sc...
ICCAD
1998
IEEE
130views Hardware» more  ICCAD 1998»
14 years 2 months ago
GPCAD: a tool for CMOS op-amp synthesis
We present a method for optimizing and automating component and transistor sizing for CMOS operational amplifiers. We observe that a wide variety of performance measures can be fo...
Maria del Mar Hershenson, Stephen P. Boyd, Thomas ...
HPCA
2005
IEEE
14 years 10 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou