Sciweavers

4386 search results - page 751 / 878
» A Tamper-Resistant Programming Language System
Sort
View
APSEC
2005
IEEE
15 years 7 months ago
Call-Ordering Constraints
Several kinds of call-ordering problems have been identified, all of which present subtle difficulties in ensuring the correctness of a sequential program. They include object pro...
Nam Tran, David Abramson, Christine Mingins
105
Voted
CODES
2005
IEEE
15 years 7 months ago
Enhanced code density of embedded CISC processors with echo technology
Code density is an important issue in memory constrained systems. Some RISC processor, e.g. the THUMB extension in the ARM processor, supports aggressive code size reduction even ...
Youfeng Wu, Mauricio Breternitz Jr., Herbert H. J....
ICDAR
2005
IEEE
15 years 7 months ago
Text Recognition of Low-resolution Document Images
Cheap and versatile cameras make it possible to easily and quickly capture a wide variety of documents. However, low resolution cameras present a challenge to OCR because it is vi...
Charles E. Jacobs, Patrice Y. Simard, Paul A. Viol...
QSIC
2005
IEEE
15 years 7 months ago
Proving the Safety of SQL Queries
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
Stefan Brass, Christian Goldberg
VISSOFT
2005
IEEE
15 years 7 months ago
The Dominance Tree in Visualizing Software Dependencies
Dominance analysis from graph theory allows one to locate subordinated software elements in a rooted dependency graph. It identifies the nesting structure for a dependency graph ...
Raimar Falke, Raimund Klein, Rainer Koschke, Joche...