Sciweavers

645 search results - page 115 / 129
» Performance Modeling and Analysis of Context-Aware Mobile So...
Sort
View
124
Voted
SIGSOFT
2008
ACM
16 years 4 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
130
Voted
CLEF
2005
Springer
15 years 9 months ago
SINAI at CLEF 2005: Multi-8 Two-Years-on and Multi-8 Merging-Only Tasks
This year, we have participated on multilingual two years on and Multi-8 merging-only CLEF task. Our main interest has been to test several usual CLIR tasks and investigate how th...
Fernando Martínez Santiago, Miguel Angel Ga...
142
Voted
LCTRTS
2004
Springer
15 years 9 months ago
Feedback driven instruction-set extension
Application specific instruction-set processors combine an efficient general purpose core with special purpose functionality that is tailored to a particular application domain. ...
Uwe Kastens, Dinh Khoi Le, Adrian Slowik, Michael ...
149
Voted
ACMACE
2009
ACM
15 years 7 months ago
Enhancing a motion capture interface by introducing context management
Nowadays, video games propose rich scenarios with movementsbased game play, through the manipulation of dedicated devices. The motivation of this study is the elaboration of a com...
Francois Picard, Pascal Estraillier
ISSTA
2004
ACM
15 years 9 months ago
Exploiting purity for atomicity
The notion that certain procedures are atomic is a fundamental correctness property of many multithreaded software systems. A procedure is atomic if for every execution there is a...
Cormac Flanagan, Stephen N. Freund, Shaz Qadeer