Sciweavers

6960 search results - page 1275 / 1392
» Continuity Analysis of Programs
Sort
View
CCS
2008
ACM
15 years 5 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ISSTA
2010
ACM
15 years 5 months ago
Causal inference for statistical fault localization
This paper investigates the application of causal inference methodology for observational studies to software fault localization based on test outcomes and profiles. This methodo...
George K. Baah, Andy Podgurski, Mary Jean Harrold
ATAL
2005
Springer
15 years 5 months ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee
EUROPAR
2008
Springer
15 years 4 months ago
Parametric Studies in Eclipse with TAU and PerfExplorer
Abstract. With support for C/C++, Fortran, MPI, OpenMP, and performance tools, the Eclipse integrated development environment (IDE) is a serious contender as a programming environm...
Kevin A. Huck, Wyatt Spear, Allen D. Malony, Samee...
FPGA
2008
ACM
623views FPGA» more  FPGA 2008»
15 years 4 months ago
From the bitstream to the netlist
We present an in-depth analysis of the Xilinx bitstream format. The information gathered in this paper allows bitstream compilation and decompilation. While not actually compromis...
Jean-Baptiste Note, Éric Rannaud
« Prev « First page 1275 / 1392 Last » Next »