Sciweavers

3316 search results - page 547 / 664
» Mining Software Engineering Data
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Linking Privacy Solutions to Developer Goals
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security community because of the existing synergy between se...
Kim Wuyts, Riccardo Scandariato, Bart De Decker, W...
ARCS
2010
Springer
15 years 4 months ago
Exploiting Inactive Rename Slots for Detecting Soft Errors
Register renaming is a widely used technique to remove false data dependencies in superscalar datapaths. Rename logic consists of a table that holds a physical register mapping for...
Mehmet Kayaalp, Oguz Ergin, Osman S. Ünsal, M...
FOSSACS
2007
Springer
15 years 4 months ago
Logical Reasoning for Higher-Order Functions with Local State
Abstract. We introduce an extension of Hoare logic for call-by-value higherorder functions with ML-like local reference generation. Local references may be generated dynamically an...
Nobuko Yoshida, Kohei Honda, Martin Berger
FSEN
2007
Springer
15 years 4 months ago
Hoare Logic for ARM Machine Code
This paper shows how a machine-code Hoare logic is used to lift reasoning from the tedious operational model of a machine lana manageable level of abstraction without making simpli...
Magnus O. Myreen, Anthony C. J. Fox, Michael J. C....
ARCS
2005
Springer
15 years 3 months ago
Self-Organization in Sensor Networks using Bio-Inspired Mechanisms
Bio-inspired communication methodologies promise to enable more scalable self-organizing network infrastructures. Especially in the area of mobile ad hoc sensor networks, such sol...
Falko Dressler, Bettina Krüger, Gerhard Fuchs...