Sciweavers

302 search results - page 51 / 61
» Indexing the Java API Using Source Code
Sort
View
ESOP
2005
Springer
15 years 7 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
DCC
2004
IEEE
16 years 1 months ago
Fast Near-Lossless or Lossless Compression of Large 3D Neuro-Anatomical Images
3D neuro-anatomical images and other volumetric data sets are important in many scientific and biomedical fields. Since such sets may be extremely large, a scalable compression me...
Rongkai Zhao, Michael Gabriel, Geneva G. Belford
COMPSAC
2009
IEEE
15 years 8 months ago
HEAT: An Integrated Static and Dynamic Approach for Thread Escape Analysis
Thread escape analysis, which determines whether and when a variable becomes shared by multiple threads, is a foundation for many other program analyses. Most existing escape anal...
Qichang Chen, Liqiang Wang, Zijiang Yang
FCCM
2007
IEEE
100views VLSI» more  FCCM 2007»
15 years 8 months ago
A Library and Platform for FPGA Bitstream Manipulation
— Since 1998, no commercially available FPGA has been accompanied by public documentation of its native machine code (or bitstream) format. Consequently, research in reconfigura...
Adam Megacz
HPDC
1999
IEEE
15 years 6 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny