Sciweavers

1210 search results - page 69 / 242
» Formal Techniques for Java Programs
Sort
View
108
Voted
SIGSOFT
2003
ACM
16 years 3 months ago
Runtime safety analysis of multithreaded programs
Foundational and scalable techniques for runtime safety analysis of multithreaded programs are explored in this paper. A technique based on vector clocks to extract the causal dep...
Koushik Sen, Grigore Rosu, Gul Agha
IWPC
2006
IEEE
15 years 8 months ago
How Webmining and Coupling Metrics Improve Early Program Comprehension
During initial program comprehension, software engineers could benefit from knowing the most need-to-beunderstood classes in the system under study in order to kick-start their s...
Andy Zaidman, Bart Du Bois, Serge Demeyer
ISSS
1999
IEEE
149views Hardware» more  ISSS 1999»
15 years 6 months ago
A Buffer Merging Technique for Reducing Memory Requirements of Synchronous Dataflow Specifications
Synchronous Dataflow, a subset of dataflow, has proven to be a good match for specifying DSP programs. Because of the limited amount of memory in embedded DSPs, a key problem duri...
Praveen K. Murthy, Shuvra S. Bhattacharyya
FMSD
2002
128views more  FMSD 2002»
15 years 2 months ago
Combining Software and Hardware Verification Techniques
Combining verification methods developed separately for software and hardware is motivated by the industry's need for a technology that would make formal verification of reali...
Robert P. Kurshan, Vladimir Levin, Marius Minea, D...
ASPLOS
1998
ACM
15 years 6 months ago
Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs
In order to execute a program on a remote computer, it must first be transferred over a network. This transmission incurs the overhead of network latency before execution can beg...
Chandra Krintz, Brad Calder, Han Bok Lee, Benjamin...