Sciweavers

3456 search results - page 227 / 692
» Byte Code Engineering
Sort
View
191
Voted
ISSTA
2000
ACM
15 years 8 months ago
Finding bugs with a constraint solver
A method for finding bugs in code is presented. For given small numbers j and k, the code of a procedure is translated into a relational formula whose models represent all executi...
Daniel Jackson, Mandana Vaziri
CSMR
1998
IEEE
15 years 7 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
134
Voted
CODES
2007
IEEE
15 years 7 months ago
Pointer re-coding for creating definitive MPSoC models
Today's MPSoC synthesis and exploration design flows start abstract input specification model captured in a system level design language. Usually this model is created from a...
Pramod Chandraiah, Rainer Dömer
138
Voted
FASE
2009
Springer
15 years 7 months ago
Enhanced Property Specification and Verification in BLAST
Model checking tools based on the iterative refinement of predicate abstraction (e.g., Slam and Blast) often feature a specification language for expressing complex behavior rules....
Ondrej Sery
179
Voted
CODES
2004
IEEE
15 years 7 months ago
Dynamic overlay of scratchpad memory for energy minimization
The memory subsystem accounts for a significant portion of the aggregate energy budget of contemporary embedded systems. Moreover, there exists a large potential for optimizing th...
Manish Verma, Lars Wehmeyer, Peter Marwedel