Sciweavers

1821 search results - page 294 / 365
» Security-Aware Program Transformations
Sort
View
DOCENG
2003
ACM
14 years 2 months ago
Set-at-a-time access to XML through DOM
To support the rapid growth of the web and e-commerce, W3C developed DOM as an application programming interface that the abstract, logical tree structure of an XML document. In t...
Hai Chen, Frank Wm. Tompa
AGTIVE
2003
Springer
14 years 2 months ago
Local Specification of Surface Subdivision Algorithms
Many polygon mesh algorithms operate in a local manner, yet are formally specified using global indexing schemes. This obscures the essence of these algorithms and makes their spe...
Colin Smith, Przemyslaw Prusinkiewicz, Faramarz F....
TAP
2010
Springer
126views Hardware» more  TAP 2010»
14 years 2 months ago
DyGen: Automatic Generation of High-Coverage Tests via Mining Gigabytes of Dynamic Traces
Unit tests of object-oriented code exercise particular sequences of method calls. A key problem when automatically generating unit tests that achieve high structural code coverage ...
Suresh Thummalapenta, Jonathan de Halleux, Nikolai...
IOLTS
2002
IEEE
99views Hardware» more  IOLTS 2002»
14 years 1 months ago
A BIST-Based Solution for the Diagnosis of Embedded Memories Adopting Image Processing Techniques
This paper proposes a new solution for the diagnosis of faults into embedded RAMs, currently under evaluation within STMicroelectronics. The proposed scheme uses dedicated circuit...
Davide Appello, Alessandra Fudoli, Vincenzo Tancor...
RTSS
2002
IEEE
14 years 1 months ago
Embedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements
In addition to real-time requirements, the program code size is a critical design factor for real-time embedded systems. To take advantage of the code size vs. execution time trad...
Insik Shin, Insup Lee, Sang Lyul Min