Sciweavers

725 search results - page 58 / 145
» Escape Analysis for Java
Sort
View
JCIT
2010
152views more  JCIT 2010»
14 years 6 months ago
Novel MicroRNAs and Targets Prediction in PRRS Virus Genome
In this paper, 4 microRNAs and their targets were predicted through a de novo prediction procedure in the genome of Porcine Reproductive and Respiratory Syndrome virus. Through cl...
Zhenlin Wei
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
14 years 3 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
JASIS
2011
110views more  JASIS 2011»
14 years 2 months ago
A material history of bits
In both the popular press and scholarly research, digital information is persistently discussed in terms that imply its immateriality. In this characterization, the digital derive...
Jean-François Blanchette
SCAM
2008
IEEE
15 years 6 months ago
Exploiting the Correspondence between Micro Patterns and Class Names
This paper argues that semantic information encoded in natural language identifiers is a largely neglected resource for program analysis. First we show that words in Java class n...
Jeremy Singer, Chris C. Kirkham
JIT
1999
Springer
123views Database» more  JIT 1999»
15 years 4 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm