Sciweavers

3404 search results - page 413 / 681
» C Programming Tutorial
Sort
View
VLSID
2005
IEEE
102views VLSI» more  VLSID 2005»
16 years 2 months ago
Rapid Embedded Hardware/Software System Generation
This paper presents an RTL generation scheme for a SimpleScalar / PISA Instruction set architecture with system calls to implement C programs. The scheme utilizes ASIPmeister, a p...
Jorgen Peddersen, Seng Lin Shee, Andhi Janapsatya,...
ASM
2010
ASM
15 years 11 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
CVPR
2010
IEEE
15 years 11 months ago
Estimation of Image Bias Field with Sparsity Constraints
We propose a new scheme to estimate image bias field through introducing two sparsity constraints. One is that the bias-free image has concise representation with image gradients o...
Yuanjie Zheng and James C. Gee
104
Voted
ECBS
2009
IEEE
105views Hardware» more  ECBS 2009»
15 years 9 months ago
A Framework for Developing Feature-Rich Software Systems
In response to changing requirements and other environmental influences, software systems are increasingly developed incrementally. Successful implementation of new features in e...
Thein Than Tun, Rod Chapman, Charles B. Haley, Rob...
110
Voted
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 9 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...