Sciweavers

2797 search results - page 108 / 560
» Code query by example
Sort
View
165
Voted
CADE
2008
Springer
16 years 3 months ago
Exploring Model-Based Development for the Verification of Real-Time Java Code
Many safety- and security-critical systems are real-time systems and, as a result, tools and techniques for verifying real-time systems are extremely important. Simulation and test...
Niusha Hakimipour, Paul A. Strooper, Roger Duke
101
Voted
DCC
2007
IEEE
16 years 2 months ago
Bit Recycling with Prefix Codes
Many data compression methods cannot remove all redundancy from a file that they compress because it can be encoded to many compressed files. In particular, we consider the redund...
Danny Dubé, Vincent Beaudoin
92
Voted
ICMCS
2007
IEEE
125views Multimedia» more  ICMCS 2007»
15 years 9 months ago
JPEG Based Conditional Entropy Coding for Correlated Steganography
Correlated steganography considers the case in which the cover Work is chosen to be correlated with the covert message that is to be hidden. The advantage of this is that, at leas...
Lei Zheng, Ingemar J. Cox
146
Voted
DATE
2010
IEEE
183views Hardware» more  DATE 2010»
15 years 7 months ago
Multithreaded code from synchronous programs: Extracting independent threads for OpenMP
—Synchronous languages offer a deterministic model of concurrency at the level of actions. However, essentially all compilers for synchronous languages compile these actions into...
Daniel Baudisch, Jens Brandt, Klaus Schneider
107
Voted
CSFW
2000
IEEE
15 years 7 months ago
Secure Composition of Untrusted Code: Wrappers and Causality Types
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
Peter Sewell, Jan Vitek