Sciweavers

1855 search results - page 155 / 371
» Composing model programs for analysis
Sort
View
WORDS
2002
IEEE
15 years 8 months ago
Writing Temporally Predictable Code
The Worst-Case Execution-Time Analysis (WCET Analysis) of program code that is to be executed on modern processors is a highly complex task. First, it involves path analysis, to i...
Peter P. Puschner, Alan Burns
140
Voted
PLDI
2003
ACM
15 years 8 months ago
Points-to analysis using BDDs
This paper reports on a new approach to solving a subset-based points-to analysis for Java using Binary Decision Diagrams (BDDs). In the model checking community, BDDs have been s...
Marc Berndl, Ondrej Lhoták, Feng Qian, Laur...
106
Voted
WSC
1997
15 years 4 months ago
Simulation of a New Product Workcell
As part of an ABB training program, two manufacturing engineers introduced a manufacturing facility to the benefits of modeling and simulation. The project goal was to evaluate a ...
Ron Shady, Gary Spake, F. Bradley Armstrong
140
Voted
ECOOP
2005
Springer
15 years 9 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
165
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 6 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...