Sciweavers

7167 search results - page 1112 / 1434
» Answer Set Programming
Sort
View
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 9 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
TOOLS
2008
IEEE
15 years 9 months ago
Controlling Accessibility in Agile Projects with the Access Modifier Modifier
Access modifiers like public and private let the programmer control the accessibility of class members. Restricted accessibility supports encapsulation, i.e., the hiding of impleme...
Philipp Bouillon, Eric Großkinsky, Friedrich...
MICRO
2007
IEEE
184views Hardware» more  MICRO 2007»
15 years 9 months ago
Data Access Partitioning for Fine-grain Parallelism on Multicore Architectures
The recent design shift towards multicore processors has spawned a significant amount of research in the area of program parallelization. The future abundance of cores on a singl...
Michael L. Chu, Rajiv A. Ravindran, Scott A. Mahlk...
ESWS
2007
Springer
15 years 9 months ago
A Reasoning Framework for Rule-Based WSML
WSML is an ontology language specifically tailored to annotate Web Services, and part of its semantics adheres to the rule-based knowledge representation paradigm of logic program...
Stephan Grimm, Uwe Keller, Holger Lausen, Gá...
CGO
2006
IEEE
15 years 9 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
« Prev « First page 1112 / 1434 Last » Next »