Sciweavers

6960 search results - page 1247 / 1392
» Continuity Analysis of Programs
Sort
View
ACSAC
2007
IEEE
15 years 9 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
154
Voted
BIBE
2007
IEEE
145views Bioinformatics» more  BIBE 2007»
15 years 9 months ago
Homomorphisms of Multisource Trees into Networks with Applications to Metabolic Pathways
Network mapping is a convenient tool for comparing and exploring biological networks; it can be used for predicting unknown pathways, fast and meaningful searching of databases, a...
Qiong Cheng, Robert W. Harrison, Alexander Zelikov...
CGO
2007
IEEE
15 years 9 months ago
Code Compaction of an Operating System Kernel
General-purpose operating systems, such as Linux, are increasingly being used in embedded systems. Computational resources are usually limited, and embedded processors often have ...
Haifeng He, John Trimble, Somu Perianayagam, Saumy...
CODES
2007
IEEE
15 years 9 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...
CSMR
2007
IEEE
15 years 9 months ago
Consistently Incorporating Changes to Evolve Transition-based Systems
Evolving software-intensive systems from one consistent state to another is a challenging activity due to the intricate inter-dependencies among the components. In this paper, we ...
Mahadevan Subramaniam, Harvey P. Siy
« Prev « First page 1247 / 1392 Last » Next »