Sciweavers

3456 search results - page 570 / 692
» Byte Code Engineering
Sort
View
126
Voted
LCTRTS
2007
Springer
15 years 9 months ago
Tetris: a new register pressure control technique for VLIW processors
The run-time performance of VLIW (very long instruction word) microprocessors depends heavily on the effectiveness of its associated optimizing compiler. Typical VLIW compiler pha...
Weifeng Xu, Russell Tessier
OOPSLA
2007
Springer
15 years 9 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
CODES
2006
IEEE
15 years 8 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
112
Voted
IOLTS
2005
IEEE
125views Hardware» more  IOLTS 2005»
15 years 8 months ago
Design of a Self Checking Reed Solomon Encoder
— In this paper, an innovative self-checking Reed Solomon encoder architecture is described. The presented architecture exploits some properties of the arithmetic operations in G...
Gian-Carlo Cardarilli, Salvatore Pontarelli, Marco...
126
Voted
ISESE
2005
IEEE
15 years 8 months ago
System test case prioritization of new and regression test cases
Test case prioritization techniques have been shown to be beneficial for improving regression-testing activities. With prioritization, the rate of fault detection is improved, thu...
Hema Srikanth, Laurie Williams, Jason Osborne