Sciweavers

1128 search results - page 101 / 226
» Little Engines of Proof
Sort
View
CASES
2010
ACM
14 years 7 months ago
Mighty-morphing power-SIMD
In modern wireless devices, two broad classes of compute-intensive applications are common: those with high amounts of data-level parallelism, such as signal processing used in wi...
Ganesh S. Dasika, Mark Woh, Sangwon Seo, Nathan Cl...
CGO
2010
IEEE
15 years 4 months ago
Towards program optimization through automated analysis of numerical precision
Reducing the arithmetic precision of a computation has real performance implications, including increased speed, decreased power consumption, and a smaller memory footprint. For s...
Michael D. Linderman, Matthew Ho, David L. Dill, T...
SCESM
2006
ACM
269views Algorithms» more  SCESM 2006»
15 years 3 months ago
Inferring operational requirements from scenarios and goal models using inductive learning
Goal orientation is an increasingly recognised Requirements Engineering paradigm. However, integration of goal modelling with operational models remains an open area for which the...
Dalal Alrajeh, Alessandra Russo, Sebastián ...
ICSM
2005
IEEE
15 years 3 months ago
A Risk Taxonomy Proposal for Software Maintenance
There can be no doubt that risk management is an important activity in the software engineering area. One proof of this is the large body of work existing in this area. However, w...
Kenia P. Batista Webster, Káthia Març...
KBSE
2005
IEEE
15 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard