Sciweavers

458 search results - page 17 / 92
» Symbolic Object Code Analysis
Sort
View
ESOP
2001
Springer
14 years 28 days ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
TCOM
2008
100views more  TCOM 2008»
13 years 8 months ago
On the performance of concatenated convolutional code and Alamouti space-time code with noisy channel estimates and finite-depth
Abstract--In this paper, performance of the Alamouti spacetime code (STC) [1] and performance of the concatenation between the convolutional code and the Alamouti STC are derived. ...
Jittra Jootar, James R. Zeidler, John G. Proakis
CODES
2009
IEEE
14 years 3 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...
IASTEDSEA
2004
13 years 9 months ago
ARIES: Refactoring support environment based on code clone analysis
Code clone has been regarded as one of factors that make software maintenance more difficult. A code clone is a code fragment in a source code that is identical or similar to anot...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...
PASTE
2005
ACM
14 years 2 months ago
Generalizing symbolic execution to library classes
Forward symbolic execution is a program analysis technique that allows using symbolic inputs to explore program executions. The traditional applications of this technique have foc...
Sarfraz Khurshid, Yuk Lai Suen