Sciweavers

42507 search results - page 35 / 8502
» On the analysis of
Sort
View
ATAL
2004
Springer
15 years 7 months ago
A Trust Analysis Methodology for Pervasive Computing Systems
Abstract. We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that des...
Stéphane Lo Presti, Michael J. Butler, Mich...
SERP
2007
15 years 3 months ago
Runtime Support of Speculative Optimization for Offline Escape Analysis
Escape analysis can improve the speed and memory efficiency of garbage collected languages by allocating objects to the call stack, but an offline analysis will potentially interf...
Kevin Cleereman, Michelle Cheatham, Krishnaprasad ...
IASTEDSE
2004
15 years 3 months ago
A Java API for Experimental analysis of algorithms
Traditionally, the emphasis among computer scientists has been on the more rigorous and theoretical modes of worstcase and average-case analysis of algorithms. However, theoretica...
Adam Duffy, Tom Dowling
SIGCOMM
2010
ACM
15 years 2 months ago
Differentially-private network trace analysis
Frank McSherry, Ratul Mahajan
POPL
1997
ACM
15 years 5 months ago
Infinitary Control Flow Analysis: a Collecting Semantics for Closure Analysis
Defining the collecting semantics is usually the first crucial step in adapting the general methodology of abstract interpretation to the semantic framework or programming languag...
Hanne Riis Nielson, Flemming Nielson