Sciweavers

222 search results - page 2 / 45
» Flow Analysis of Code Customizations
Sort
View
ISCAS
2006
IEEE
146views Hardware» more  ISCAS 2006»
13 years 11 months ago
XML-based customization along the scalability axes of H.264/AVC scalable video coding
Abstract— The heterogeneity in the current and future multimedia environment requires an elegant adaptation framework for the production and consumption of different kinds of mul...
Davy De Schrijver, Wesley De Neve, Koen De Wolf, S...
FMCAD
2008
Springer
13 years 6 months ago
Mechanized Information Flow Analysis through Inductive Assertions
We present a method for verifying information flow properties of software programs using inductive assertions and theorem proving. Given a program annotated with information flow a...
Warren A. Hunt Jr., Robert Bellarmine Krug, Sandip...
JCIT
2010
98views more  JCIT 2010»
12 years 11 months ago
Reliability Analysis of the MAP/M/c Queue with Server Breakdowns
We consider the MAP/M/c queue with markovian flow of breakdowns. There are K waiting positions for arrival customers in the system. The system we consider comprises c servers, of ...
Zonghao Zhou, Yijuan Zhu
ESTIMEDIA
2006
Springer
13 years 8 months ago
Use of a Bit-true Data Flow Analysis for Processor-Specific Source Code Optimization
Nowadays, key characteristics of a processor's instruction set are only exploited in high-level languages by using inline assembly or compiler intrinsics. Inserting intrinsic...
Heiko Falk, Jens Wagner, André Schaefer
INFSOF
2002
78views more  INFSOF 2002»
13 years 4 months ago
Flow insensitive points-to sets
Pointer analysis is an important part of source code analysis. Many programs that manipulate source code take points-to sets as part of their input. Points-to related data collect...
Paul Anderson, David Binkley, Genevieve Rosay, Tim...