Sciweavers

1629 search results - page 48 / 326
» Infeasible Code Detection
Sort
View
ICST
2009
IEEE
14 years 4 months ago
Quality Assurance of Software Applications Using the In Vivo Testing Approach
Software products released into the field typically have some number of residual defects that either were not detected or could not have been detected during testing. This may be...
Christian Murphy, Gail E. Kaiser, Ian Vo, Matt Chu
ESAS
2005
Springer
14 years 3 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...
MICRO
2002
IEEE
113views Hardware» more  MICRO 2002»
14 years 3 months ago
Vacuum packing: extracting hardware-detected program phases for post-link optimization
This paper presents Vacuum Packing, a new approach to profile-based program optimization. Instead of using traditional aggregate or summarized execution profile weights, this ap...
Ronald D. Barnes, Erik M. Nystrom, Matthew C. Mert...
DELTA
2002
IEEE
14 years 3 months ago
Multi-User Detection for CDMA Communications Based on Self Organized Neural Networks Structures
In the upcoming high transmission rate system, based on code division multiple access, standard multi-user detection methods are restricted because of performance and implementati...
Florent Carlier, Fabienne Nouvel, Jacques Citerne
CLEIEJ
2010
13 years 7 months ago
Quality Improvement in Annotated Code
In order to customize their behavior at runtime, a wide sort of modern frameworks do use code annotations at the applications classes as metadata configuration. However, despite i...
Diego A. A. Correia, Eduardo M. Guerra, Fáb...