Sciweavers

309 search results - page 45 / 62
» Code Transformations for One-Pass Analysis
Sort
View
SIGSOFT
2007
ACM
16 years 14 days ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
16 years 8 days ago
An association analysis approach to biclustering
The discovery of biclusters, which denote groups of items that show coherent values across a subset of all the transactions in a data set, is an important type of analysis perform...
Gaurav Pandey, Gowtham Atluri, Michael Steinbach, ...
SIGSOFT
2004
ACM
15 years 5 months ago
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL
In run-time safety analysis the executions of a concurrent program are monitored and analyzed with respect to safety properties. Similar to testing, run-time analysis is quite eï¬...
Jürgen Dingel, Hongzhi Liang
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
15 years 3 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
CASES
2005
ACM
15 years 1 months ago
Optimizing stream programs using linear state space analysis
Digital Signal Processing (DSP) is becoming increasingly widespread in portable devices. Due to harsh constraints on power, latency, and throughput in embedded environments, devel...
Sitij Agrawal, William Thies, Saman P. Amarasinghe