Sciweavers

1911 search results - page 281 / 383
» Program analysis for code duplication in logic programs
Sort
View
145
Voted
INFSOF
2008
121views more  INFSOF 2008»
15 years 2 months ago
A test driven approach for aspectualizing legacy software using mock systems
Aspect-based refactoring, called aspectualization, involves moving program code that implements cross-cutting concerns into aspects. Such refactoring can improve the maintainabili...
Michael Mortensen, Sudipto Ghosh, James M. Bieman
ERSHOV
2009
Springer
15 years 8 days ago
Applicability of the BLAST Model Checker: An Industrial Case Study
Model checking of software has been a very active research topic recently. As a result, a number of software model checkers have been developed for analysis of software written in ...
Emanuel Kolb, Ondrej Sery, Roland Weiss
CC
2006
Springer
124views System Software» more  CC 2006»
15 years 6 months ago
Polyhedral Code Generation in the Real World
The polyhedral model is known to be a powerful framework to reason about high level loop transformations. Recent developments in optimizing compilers broke some generally accepted ...
Nicolas Vasilache, Cédric Bastoul, Albert C...
FCCM
2011
IEEE
220views VLSI» more  FCCM 2011»
14 years 6 months ago
Reducing the Energy Cost of Irregular Code Bases in Soft Processor Systems
— This paper describes an architecture and FPGA synthesis toolchain for building specialized, energy-saving coprocessors called Irregular Code Energy Reducers (ICERs) for a wide ...
Manish Arora, Jack Sampson, Nathan Goulding-Hotta,...
CCS
2007
ACM
15 years 6 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...