Sciweavers

1077 search results - page 56 / 216
» Hardware code generation from dataflow programs
Sort
View
EUROMICRO
2005
IEEE
15 years 7 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
122
Voted
SCAM
2008
IEEE
15 years 8 months ago
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code
—More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by diffe...
Nuno F. Rodrigues, Luís Soares Barbosa
EMSOFT
2007
Springer
15 years 7 months ago
The revenge of the overlay: automatic compaction of OS kernel code via on-demand code loading
There is increasing interest in using general-purpose operating systems, such as Linux, on embedded platforms. It is especially important in embedded systems to use memory effici...
Haifeng He, Saumya K. Debray, Gregory R. Andrews
CGO
2007
IEEE
15 years 8 months ago
Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications
Run-time compilation systems are challenged with the task of translating a program’s instruction stream while maintaining low overhead. While software managed code caches are ut...
Vijay Janapa Reddi, Dan Connors, Robert Cohn, Mich...
CSREAEEE
2008
199views Business» more  CSREAEEE 2008»
15 years 3 months ago
Progranimate - A Web Enabled Algorithmic Problem Solving Application
- This paper proposes the use of an interactive web based problem solving application that utilises flowchart based programming and code generation to address the issues faced by n...
Andrew Scott, Mike Watkins, Duncan McPhee