Sciweavers

890 search results - page 171 / 178
» Programming language methods in computer security
Sort
View
ICALP
2007
Springer
14 years 2 months ago
Estimating Sum by Weighted Sampling
We study the classic problem of estimating the sum of n variables. The traditional uniform sampling approach requires a linear number of samples to provide any non-trivial guarante...
Rajeev Motwani, Rina Panigrahy, Ying Xu 0002
KI
2007
Springer
14 years 2 months ago
Options in Readylog Reloaded - Generating Decision-Theoretic Plan Libraries in Golog
Readylog is a logic-based agent programming language and combines many important features from other Golog dialects. One of the features of Readylog is to make use of decision-theo...
Lutz Böhnstedt, Alexander Ferrein, Gerhard La...
ISESE
2006
IEEE
14 years 2 months ago
Identifying domain-specific defect classes using inspections and change history
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Taiga Nakamura, Lorin Hochstein, Victor R. Basili
ISORC
2006
IEEE
14 years 2 months ago
Automatic Memory Management in Utility Accrual Scheduling Environments
Convenience, reliability, and effectiveness of automatic memory management have long been established in modern systems and programming languages such as Java. The timeliness req...
Shahrooz Feizabadi, Godmar Back
ASAP
2005
IEEE
133views Hardware» more  ASAP 2005»
14 years 2 months ago
Speedups from Partitioning Critical Software Parts to Coarse-Grain Reconfigurable Hardware
In this paper, we propose a hardware/software partitioning method for improving applications’ performance in embedded systems. Critical software parts are accelerated on hardwar...
Michalis D. Galanis, Grigoris Dimitroulakos, Costa...