Sciweavers

3889 search results - page 767 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
MIDDLEWARE
2004
Springer
14 years 1 months ago
A context-aware middleware for applications in mobile Ad Hoc environments
Novel ubiquitous computing applications such as intelligent vehicles, smart buildings, and traffic management require special properties that traditional computing applications d...
Carl-Fredrik Sørensen, Maomao Wu, Thirunavu...
CCS
2009
ACM
14 years 8 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
PLDI
2005
ACM
14 years 1 months ago
Garbage collection without paging
Garbage collection offers numerous software engineering advantages, but interacts poorly with virtual memory managers. Existing garbage collectors require far more pages than the ...
Matthew Hertz, Yi Feng, Emery D. Berger
OOPSLA
2005
Springer
14 years 1 months ago
Demand-driven points-to analysis for Java
We present a points-to analysis technique suitable for environments with small time and memory budgets, such as just-in-time (JIT) compilers and interactive development environmen...
Manu Sridharan, Denis Gopan, Lexin Shan, Rastislav...
ISSTA
2004
ACM
14 years 1 months ago
Evolutionary testing in the presence of loop-assigned flags: a testability transformation approach
Evolutionary testing is an effective technique for automatically generating good quality test data. However, for structural testing, the technique degenerates to random testing i...
André Baresel, David Binkley, Mark Harman, ...