Sciweavers

11653 search results - page 163 / 2331
» The Development of the C Language
Sort
View
SIGSOFT
2007
ACM
16 years 4 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
122
Voted
SCOPES
2005
Springer
15 years 9 months ago
Software Synthesis from the Dataflow Interchange Format
Specification, validation, and synthesis are important aspects of embedded systems design. The use of dataflow-based design environments for these purposes is becoming increasingl...
Chia-Jui Hsu, Shuvra S. Bhattacharyya
119
Voted
EHCI
1998
15 years 5 months ago
External Requirements of Groupware Development Tools
: The EHCI'98 Workshop on Requirements of Groupware Development Tools examined six groupware applications in order to derive requirements for tools for developing groupware. W...
T. C. Nicholas Graham, John C. Grundy
92
Voted
ASPLOS
2006
ACM
15 years 9 months ago
OSEK/VDX API for Java
Modern cars contain a multitude of micro controllers for a wide area of tasks. The diversity of the heterogeneous hardware and software leads to a complicated and expensive integr...
Michael Stilkerich, Christian Wawersich, Andreas G...
132
Voted
PLDI
2006
ACM
15 years 9 months ago
LOCKSMITH: context-sensitive correlation analysis for race detection
One common technique for preventing data races in multi-threaded programs is to ensure that all accesses to shared locations are consistently protected by a lock. We present a too...
Polyvios Pratikakis, Jeffrey S. Foster, Michael W....