Sciweavers

5843 search results - page 1049 / 1169
» Software Security in Practice
Sort
View
PLDI
2000
ACM
14 years 1 months ago
Off-line variable substitution for scaling points-to analysis
Most compiler optimizations and software productivity tools rely on information about the effects of pointer dereferences in a program. The purpose of points-to analysis is to com...
Atanas Rountev, Satish Chandra
ATAL
1995
Springer
14 years 1 months ago
The Architecture of an Agent Building Shell
The agent view provides maybe the right level of abstraction for dealing with complex, distribblem-solving systems. It abstracts from aspects like the hardware or software platfor...
Mihai Barbuceanu, Mark S. Fox
ASM
2010
ASM
14 years 1 months ago
Starting B Specifications from Use Cases
The B method is one of the most used formal methods, when reactive systems is under question, due to good support for refinement. However, obtaining the formal model from requireme...
Thiago C. de Sousa, Aryldo G. Russo
WSC
2008
14 years 16 days ago
Towards a flexible business process modeling and simulation environment
Business process is crucial to the success of any business. Business process modeling enables a common understanding and analysis of a business process, and simulation is an effec...
Changrui Ren, Wei Wang, Jin Dong, Hongwei Ding, Bi...
CF
2005
ACM
14 years 6 days ago
Reversible logic for supercomputing
This paper is about making reversible logic a reality for supercomputing. Reversible logic offers a way to exceed certain basic limits on the performance of computers, yet a power...
Erik DeBenedictis
« Prev « First page 1049 / 1169 Last » Next »