Sciweavers

1911 search results - page 301 / 383
» Program analysis for code duplication in logic programs
Sort
View
DSN
2005
IEEE
15 years 8 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
107
Voted
EUROPAR
2005
Springer
15 years 8 months ago
Developing Java Grid Applications with Ibis
Ibis1 is a programming environment for the development of grid applications in Java. We aim to support a wide range of applications and parallel platforms, so our example programs ...
Kees van Reeuwijk, Rob van Nieuwpoort, Henri E. Ba...
224
Voted
HIPC
2009
Springer
15 years 4 days ago
A performance prediction model for the CUDA GPGPU platform
The significant growth in computational power of modern Graphics Processing Units(GPUs) coupled with the advent of general purpose programming environments like NVIDA's CUDA,...
Kishore Kothapalli, Rishabh Mukherjee, M. Suhail R...
93
Voted
ICSE
2009
IEEE-ACM
16 years 3 months ago
The road not taken: Estimating path execution frequency statically
A variety of compilers, static analyses, and testing frameworks rely heavily on path frequency information. Uses for such information range from optimizing transformations to bug ...
Raymond P. L. Buse, Westley Weimer
AMAST
2004
Springer
15 years 7 months ago
A Generic Software Safety Document Generator
Abstract. Formal certification is based on the idea that a mathematical proof of some property of a piece of software can be regarded as a certificate of correctness which, in pr...
Ewen Denney, Ram Prasad Venkatesan