Sciweavers

852 search results - page 30 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
PLDI
2011
ACM
14 years 6 months ago
Understanding POWER multiprocessors
Exploiting today’s multiprocessors requires highperformance and correct concurrent systems code (optimising compilers, language runtimes, OS kernels, etc.), which in turn requir...
Susmit Sarkar, Peter Sewell, Jade Alglave, Luc Mar...
EIS
2011
290views ECommerce» more  EIS 2011»
14 years 11 months ago
Code query by example
Most software engineering techniques that deal with software products customization are based on anticipation: The software designer has to foresee, somehow, the future needs for ...
Sebastien Vaucouleur
IJCV
2002
227views more  IJCV 2002»
15 years 3 months ago
Calculating Dense Disparity Maps from Color Stereo Images, an Efficient Implementation
Abstract-- This paper presents an efficient implementation for correlation based stereo. Research in this area can roughly be divided in two classes: improving accuracy regardless ...
Karsten Mühlmann, Dennis Maier, Jürgen H...
ACSAC
2005
IEEE
15 years 9 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
C5
2010
IEEE
15 years 9 months ago
CodeTalk
—Contemporary development environments do not directly and explicitly support developers in having a conversation about the code they write and maintain. This problem is aggravat...
Bastian Steinert, Marcel Taeumel, Jens Lincke, Tob...