Sciweavers

302 search results - page 51 / 61
» Indexing the Java API Using Source Code
Sort
View
136
Voted
ESOP
2005
Springer
15 years 5 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
92
Voted
DCC
2004
IEEE
15 years 11 months ago
Fast Near-Lossless or Lossless Compression of Large 3D Neuro-Anatomical Images
3D neuro-anatomical images and other volumetric data sets are important in many scientific and biomedical fields. Since such sets may be extremely large, a scalable compression me...
Rongkai Zhao, Michael Gabriel, Geneva G. Belford
COMPSAC
2009
IEEE
15 years 6 months ago
HEAT: An Integrated Static and Dynamic Approach for Thread Escape Analysis
Thread escape analysis, which determines whether and when a variable becomes shared by multiple threads, is a foundation for many other program analyses. Most existing escape anal...
Qichang Chen, Liqiang Wang, Zijiang Yang
92
Voted
FCCM
2007
IEEE
100views VLSI» more  FCCM 2007»
15 years 5 months ago
A Library and Platform for FPGA Bitstream Manipulation
— Since 1998, no commercially available FPGA has been accompanied by public documentation of its native machine code (or bitstream) format. Consequently, research in reconfigura...
Adam Megacz
HPDC
1999
IEEE
15 years 3 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny