Sciweavers

2957 search results - page 278 / 592
» Code analysis and CS-XML
Sort
View
TPHOL
2007
IEEE
15 years 10 months ago
Extracting Purely Functional Contents from Logical Inductive Types
We propose a method to extract purely functional contents from logical inductive types in the context of the Calculus of Inductive Constructions. This method is based on a mode con...
David Delahaye, Catherine Dubois, Jean-Fréd...
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
15 years 10 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...
IPPS
1998
IEEE
15 years 8 months ago
DEEP: A Development Environment for Parallel Programs
The use of the DEEP development environment to analyze parallel program performance is described. The full integrated environment contains tools for the creation, analysis and deb...
Brian Q. Brode, Chris R. Warber
ECRTS
2004
IEEE
15 years 7 months ago
Static Determination of Probabilistic Execution Times
Most previous research done in probabilistic schedulability analysis assumes a known distribution of execution times for each task of a real-time application. This is however not ...
Laurent David, Isabelle Puaut
ESANN
2008
15 years 5 months ago
Discrimination of regulatory DNA by SVM on the basis of over- and under-represented motifs
In this paper we apply three pattern recognition methods (support vector machine, cluster analysis and principal component analysis) to distinguish regulatory regions from coding a...
Rene te Boekhorst, Irina I. Abnizova, Lorenz Werni...