Sciweavers

1557 search results - page 259 / 312
» Programming up to Congruence
Sort
View
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 5 months ago
An MDE methodology for the development of high-integrity real-time systems
—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Silvia Mazzini, Stefano Puri, Tullio Vardanega
KBSE
2009
IEEE
15 years 5 months ago
Static Validation of C Preprocessor Macros
—The widely used C preprocessor (CPP) is generally considered a source of difficulty for understanding and maintaining C/C++ programs. The main reason for this difficulty is CP...
Andreas Saebjoernsen, Lingxiao Jiang, Daniel J. Qu...
MICRO
2009
IEEE
132views Hardware» more  MICRO 2009»
15 years 5 months ago
EazyHTM: eager-lazy hardware transactional memory
Transactional Memory aims to provide a programming model that makes parallel programming easier. Hardware implementations of transactional memory (HTM) suffer from fewer overhead...
Sasa Tomic, Cristian Perfumo, Chinmay Eishan Kulka...
ISW
2009
Springer
15 years 5 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
SIGUCCS
2009
ACM
15 years 5 months ago
The many benefits of cultivating a community among IT staff
Conference Abstracts October 11-14, 2009 t provides the abstracts and the author(s)’ name(s) for the technical program. The actual presenter(s) may vary. Updated September 20, 20...
Ken Layng