Sciweavers

4377 search results - page 671 / 876
» Application Driven Software Development
Sort
View
LCTRTS
2007
Springer
15 years 8 months ago
Combining source-to-source transformations and processor instruction set extensions for the automated design-space exploration o
Industry’s demand for flexible embedded solutions providing high performance and short time-to-market has led to the development of configurable and extensible processors. The...
Richard Vincent Bennett, Alastair Colin Murray, Bj...
MATES
2005
Springer
15 years 7 months ago
Collaborative Agent-Based Knowledge Support for Empirical and Knowledge-Intense Processes
Independent from specific application domains, similar requirements can be identified regarding information needs during daily work. For coping with generality on the one hand an...
Andrea Freßmann, Kerstin Maximini, Rainer Ma...
PLDI
2003
ACM
15 years 7 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
98
Voted
ECBS
1996
IEEE
93views Hardware» more  ECBS 1996»
15 years 6 months ago
A Methodology for Designing and Dimensioning Critical Complex Computing Systems
It is widely recognized that real-time,fault-tolerant and distributed computing technologies play a key role in the deployment of many current andfuture (civilian or Defense) crit...
Gérard Le Lann
ISSRE
2010
IEEE
15 years 6 days ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...