Sciweavers

506 search results - page 51 / 102
» Where Is the Value in a Program Verifier
Sort
View
TNN
2008
106views more  TNN 2008»
15 years 4 months ago
Stability and Hopf Bifurcation of a General Delayed Recurrent Neural Network
In this paper, stability and bifurcation of a general recurrent neural network with multiple time delays is considered, where all the variables of the network can be regarded as bi...
Wenwu Yu, Jinde Cao, Guanrong Chen
ICCD
2002
IEEE
88views Hardware» more  ICCD 2002»
16 years 1 months ago
Improving Processor Performance by Simplifying and Bypassing Trivial Computations
During the course of a program’s execution, a processor performs many trivial computations; that is, computations that can be simplified or where the result is zero, one, or equ...
Joshua J. Yi, David J. Lilja
POPL
2007
ACM
16 years 4 months ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
APLAS
2006
ACM
15 years 10 months ago
XML Validation for Context-Free Grammars
String expression analysis conservatively approximates the possible string values generated by a program. We consider the validation of a context-free grammar obtained by the analy...
Yasuhiko Minamide, Akihiko Tozawa
132
Voted
SAC
2010
ACM
15 years 11 months ago
Checking concurrent contracts with aspects
The applicability of aspects as a means of implementing runtime contract checking has been demonstrated in prior work, where contracts are identified as cross-cutting concerns [1...
Eric Kerfoot, Steve McKeever