Sciweavers

3456 search results - page 398 / 692
» Byte Code Engineering
Sort
View
PROCOMET
1998
15 years 5 months ago
Extended static checking
Software development and maintenance are costly endeavors. The cost can be reduced if more software defects are detected earlier in the development cycle. This paper introduces th...
K. Rustan M. Leino
CODES
2008
IEEE
15 years 4 months ago
Methodology for multi-granularity embedded processor power model generation for an ESL design flow
With power becoming a major constraint for multi-processor embedded systems, it is becoming important for designers to characterize and model processor power dissipation. It is cr...
Young-Hwan Park, Sudeep Pasricha, Fadi J. Kurdahi,...
ICFEM
2010
Springer
15 years 2 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...
IWPC
2010
IEEE
15 years 2 months ago
Understanding and Auditing the Licensing of Open Source Software Distributions
—Free and open source software (FOSS) is often distributed in binary packages, sometimes part of GNU/Linux operating system distributions, or part of products distributed/sold to...
Daniel M. Germán, Massimiliano Di Penta, Ju...
MEDIAFORENSICS
2010
15 years 2 months ago
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Félix Balado