Sciweavers

2512 search results - page 351 / 503
» Software Transactional Memory
Sort
View
136
Voted
EUROSYS
2006
ACM
15 years 11 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
ICSM
2009
IEEE
15 years 9 months ago
Augmenting static source views in IDEs with dynamic metrics
Mainstream IDEs such as Eclipse support developers in managing software projects mainly by offering static views of the source code. Such a static perspective neglects any informa...
David Röthlisberger, Marcel Harry, Alex Villa...
KBSE
2008
IEEE
15 years 9 months ago
Automatic Inference of Frame Axioms Using Static Analysis
Many approaches to software verification are currently semi-automatic: a human must provide key logical insights — e.g., loop invariants, class invariants, and frame axioms tha...
Zvonimir Rakamaric, Alan J. Hu
COMSWARE
2007
IEEE
15 years 8 months ago
Sensor Network Deployment For Agronomical Data Gathering in Semi-Arid Regions
— We share our experience in planning, designing and deploying a wireless sensor network of one square kilometre area. Environmental data such as soil moisture, temperature, baro...
Tamma V. Prabhakar, N. V. Chalapathi Rao, M. S. Su...
99
Voted
KBSE
2007
IEEE
15 years 8 months ago
Sequential circuits for program analysis
A number of researchers have proposed the use of Boolean satisfiability solvers for verifying C programs. They encode correctness checks as Boolean formulas using finitization: ...
Fadi A. Zaraket, Adnan Aziz, Sarfraz Khurshid