Sciweavers

5790 search results - page 872 / 1158
» Distributed programming with distributed authorization
Sort
View
142
Voted
COMSWARE
2006
IEEE
15 years 8 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
143
Voted
ICAC
2006
IEEE
15 years 8 months ago
Using Autonomic Principles to Manage Converged Services in Next Generation Networks
Network resources will always be heterogeneous, and thus have different functionalities and programming models. This adversely affects interoperability. Seamless Mobility is one e...
John Strassner
118
Voted
IEEEPACT
2006
IEEE
15 years 8 months ago
Whole-program optimization of global variable layout
On machines with high-performance processors, the memory system continues to be a performance bottleneck. Compilers insert prefetch operations and reorder data accesses to improve...
Nathaniel McIntosh, Sandya Mannarswamy, Robert Hun...
115
Voted
IEEEPACT
2006
IEEE
15 years 8 months ago
Region array SSA
Static Single Assignment (SSA) has become the intermediate program representation of choice in most modern compilers because it enables efficient data flow analysis of scalars an...
Silvius Rus, Guobin He, Christophe Alias, Lawrence...
ECLIPSE
2006
ACM
15 years 8 months ago
Visualization of clone detection results
The goal of a clone detection tool is to identify sections of code that are duplicated in a program. The result of the detection is presented in some manner for the user to view, ...
Robert Tairas, Jeff Gray, Ira D. Baxter