Sciweavers

1412 search results - page 114 / 283
» The Value of Outsourced Software
Sort
View
COMSWARE
2008
IEEE
14 years 3 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
VMCAI
2007
Springer
14 years 3 months ago
DIVINE: DIscovering Variables IN Executables
Abstract. This paper addresses the problem of recovering variable-like entities when analyzing executables in the absence of debugging information. We show that variable-like entit...
Gogul Balakrishnan, Thomas W. Reps
SEFM
2005
IEEE
14 years 2 months ago
Description Logics for Shape Analysis
Verification of programs requires reasoning about sets of program states. In case of programs manipulating pointers, program states are pointer graphs. Verification of such prog...
Lilia Georgieva, Patrick Maier
MICRO
2003
IEEE
142views Hardware» more  MICRO 2003»
14 years 2 months ago
Hardware Support for Control Transfers in Code Caches
Many dynamic optimization and/or binary translation systems hold optimized/translated superblocks in a code cache. Conventional code caching systems suffer from overheads when con...
Ho-Seop Kim, James E. Smith
ESEC
1999
Springer
14 years 1 months ago
Comparison Checking: An Approach to Avoid Debugging of Optimized Code
Abstract. We present a novel approach to avoid the debugging of optimized code through comparison checking. In the technique presented, both the unoptimized and optimized versions ...
Clara Jaramillo, Rajiv Gupta, Mary Lou Soffa