Sciweavers

309 search results - page 51 / 62
» Code Transformations for One-Pass Analysis
Sort
View
SAC
2009
ACM
15 years 6 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
SIGMETRICS
2003
ACM
199views Hardware» more  SIGMETRICS 2003»
15 years 5 months ago
Data cache locking for higher program predictability
Caches have become increasingly important with the widening gap between main memory and processor speeds. However, they are a source of unpredictability due to their characteristi...
Xavier Vera, Björn Lisper, Jingling Xue
PASTE
1999
ACM
15 years 4 months ago
Identifying Procedural Structure in Cobol Programs
The principal control-flow abstraction mechanism in the Cobol language is the PERFORM statement. Normally, PERFORM statements are used in a straightforward manner to define para...
John Field, G. Ramalingam
CODES
2009
IEEE
15 years 6 months ago
FlexRay schedule optimization of the static segment
The FlexRay bus is the prospective automotive standard communication system. For the sake of a high flexibility, the protocol includes a static time-triggered and a dynamic event...
Martin Lukasiewycz, Michael Glaß, Jürge...
IIHMSP
2006
IEEE
136views Multimedia» more  IIHMSP 2006»
15 years 5 months ago
Boosted String Representation and Its Application to Video Surveillance
This paper presents a new behavior classification system for analyzing human movements directly from video sequences. First of all, we propose a triangulation-based method to tran...
Yung-Tai Hsu, Jun-Wei Hsieh