Sciweavers

1486 search results - page 113 / 298
» Firewall Rules Analysis
Sort
View
TCS
2008
15 years 4 months ago
Computational self-assembly
The object of this paper is to appreciate the computational limits inherent in the combinatorics of an applied concurrent (aka agent-based) language . That language is primarily m...
Pierre-Louis Curien, Vincent Danos, Jean Krivine, ...
POPL
2012
ACM
13 years 11 months ago
Syntactic control of interference for separation logic
Separation Logic has witnessed tremendous success in recent years in reasoning about programs that deal with heap storage. Its success owes to the fundamental principle that one s...
Uday S. Reddy, John C. Reynolds
140
Voted
OOPSLA
2010
Springer
15 years 2 months ago
Parallel inclusion-based points-to analysis
Inclusion-based points-to analysis provides a good trade-off between precision of results and speed of analysis, and it has been incorporated into several production compilers inc...
Mario Méndez-Lojo, Augustine Mathew, Keshav...
DATE
2002
IEEE
166views Hardware» more  DATE 2002»
15 years 9 months ago
Event Model Interfaces for Heterogeneous System Analysis
Complex embedded systems consist of hardware and software components from different domains, such as control and signal processing, many of them supplied by different IP vendors. ...
Kai Richter, Rolf Ernst
TOOLS
1997
IEEE
15 years 8 months ago
Mapping the OO-Jacobson Approach into Function Point Analysis
Function Point Analysis measures user requested functionality independent of the technology used for implementation. Software applications are represented stract model that contai...
T. Fetcke, A. Abran, T.-H. Nguyen