Sciweavers

181 search results - page 25 / 37
» Program Slicing and Data Provenance
Sort
View
NAR
2010
281views more  NAR 2010»
13 years 4 months ago
PDBselect 1992-2009 and PDBfilter-select
PDBselect (http://bioinfo.tg.fh-giessen.de/pdb select/) is a list of representative protein chains with low mutual sequence identity selected from the protein data bank (PDB) to e...
Sven Griep, Uwe Hobohm
ISSS
1999
IEEE
149views Hardware» more  ISSS 1999»
14 years 2 months ago
A Buffer Merging Technique for Reducing Memory Requirements of Synchronous Dataflow Specifications
Synchronous Dataflow, a subset of dataflow, has proven to be a good match for specifying DSP programs. Because of the limited amount of memory in embedded DSPs, a key problem duri...
Praveen K. Murthy, Shuvra S. Bhattacharyya
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
13 years 11 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
ASPLOS
2011
ACM
13 years 1 months ago
ConSeq: detecting concurrency bugs through sequential errors
Concurrency bugs are caused by non-deterministic interleavings between shared memory accesses. Their effects propagate through data and control dependences until they cause softwa...
Wei Zhang, Junghee Lim, Ramya Olichandran, Joel Sc...
WCRE
2000
IEEE
14 years 2 months ago
Revisiting the Delta IC Approach to Component Recovery
Component recovery supports program understanding, architecture recovery, and re-use. Among the best known techniques for detection of re-usable objects (related global variables ...
Gerardo Canfora, Jörg Czeranski, Rainer Kosch...