Sciweavers

439 search results - page 57 / 88
» Program Generators and the Tools to Make Them
Sort
View
ICDE
2005
IEEE
130views Database» more  ICDE 2005»
15 years 9 months ago
Data Acquisition in Sensor Networks with Large Memories
Sensor Networks will soon become ubiquitous, making them essential tools for monitoring the activity and evolution of our surrounding environment. However such environments are ex...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki, Dimi...
TSE
2008
89views more  TSE 2008»
15 years 4 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...
161
Voted
ASPLOS
2004
ACM
15 years 9 months ago
HOIST: a system for automatically deriving static analyzers for embedded systems
Embedded software must meet conflicting requirements such as being highly reliable, running on resource-constrained platforms, and being developed rapidly. Static program analysi...
John Regehr, Alastair Reid
CODES
2006
IEEE
15 years 6 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
NCA
2005
IEEE
15 years 9 months ago
Reducing the Communication Cost via Chain Pattern Scheduling
This paper deals with general nested loops and proposes a novel scheduling methodology for reducing the communication cost of parallel programs. General loops contain complex loop...
Florina M. Ciorba, Theodore Andronikos, Ioannis Dr...