Sciweavers

1137 search results - page 99 / 228
» Disciplined Methods of Software Specification: A Case Study
Sort
View
DAC
2003
ACM
15 years 10 months ago
Automated synthesis of efficient binary decoders for retargetable software toolkits
A binary decoder is a common component of software development tools such as instruction set simulators, disassemblers and debuggers. The efficiency of the decoder can have a sign...
Wei Qin, Sharad Malik
SBMF
2010
Springer
132views Formal Methods» more  SBMF 2010»
14 years 4 months ago
Midlet Navigation Graphs in JML
Abstract. In the context of the EU project Mobius on Proof Carrying Code for Java programs (midlets) on mobile devices, we present a way to express midlet navigation graphs in JML....
Wojciech Mostowski, Erik Poll
BIBE
2008
IEEE
203views Bioinformatics» more  BIBE 2008»
15 years 4 months ago
A study of the parameters affecting minimum detectable activity concentration level of clinical LSO PET scanners
— Recent studies in the field of molecular imaging have demonstrated the need for PET probes capable of imaging very weak activity distributions. Over this range of applications ...
Nicolas A. Karakatsanis, Konstantina S. Nikita
IS
2010
14 years 7 months ago
Multicriteria reinforcement learning based on a Russian doll method for network routing
The routing in communication networks is typically a multicriteria decision making (MCDM) problem. However, setting the parameters of most used MCDM methods to fit the preferences ...
Alain Pétrowski, Farouk Aissanou, Ilham Ben...
COMSWARE
2006
IEEE
15 years 3 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...