Sciweavers

1446 search results - page 244 / 290
» Hardware Software Co-Design Using Functional Languages
Sort
View
CASES
2003
ACM
15 years 7 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...
SIGSOFT
2003
ACM
16 years 2 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ADBIS
2008
Springer
128views Database» more  ADBIS 2008»
15 years 8 months ago
Pylonix: A Database Module for Collaborative Document Management
Abstract. In today’s world, document management plays an increasingly important role. However, there is currently no solution to manage complex documents in an integrated manner....
Christian Tilgner, Dietrich Christopeit, Klaus R. ...
TSE
2002
99views more  TSE 2002»
15 years 1 months ago
Recovering Traceability Links between Code and Documentation
Software system documentation is almost always expressed informally in natural language and free text. Examples include requirement specifications, design documents, manual pages, ...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...
TLDI
2003
ACM
135views Formal Methods» more  TLDI 2003»
15 years 7 months ago
Typed compilation of recursive datatypes
Standard ML employs an opaque (or generative) semantics of datatypes, in which every datatype declaration produces a new type that is different from any other type, including othe...
Joseph Vanderwaart, Derek Dreyer, Leaf Petersen, K...