Sciweavers

957 search results - page 139 / 192
» Modular Static Program Analysis
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
VLDB
1994
ACM
128views Database» more  VLDB 1994»
15 years 1 months ago
An Algebraic Approach to Rule Analysis in Expert Database Systems
Expert database systems extend the functionality of conventional database systems by providing a facility for creating and automatically executing Condition-Action rules. While Con...
Elena Baralis, Jennifer Widom
FM
2009
Springer
123views Formal Methods» more  FM 2009»
15 years 4 months ago
"Carbon Credits" for Resource-Bounded Computations Using Amortised Analysis
Abstract. Bounding resource usage is important for a number of areas, notably real-time embedded systems and safety-critical systems. In this paper, we present a fully automatic st...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
RTSS
2008
IEEE
15 years 4 months ago
WCET Analysis of Multi-level Non-inclusive Set-Associative Instruction Caches
With the advent of increasingly complex hardware in realtime embedded systems (processors with performance enhancing features such as pipelines, cache hierarchy, multiple cores), ...
Damien Hardy, Isabelle Puaut
RTAS
1998
IEEE
15 years 2 months ago
Bounding Loop Iterations for Timing Analysis
Static timing analyzers need to know the minimum and maximum number of iterations associated with each loop in a real-time program so accurate timing predictions can be obtained. ...
Christopher A. Healy, Mikael Sjödin, Viresh R...