Sciweavers

3708 search results - page 326 / 371
» Programming with C Exceptions
Sort
View
129 views 171 votes 16 years 1 months ago  POPL 2001»
By combining existing type systems with standard typebased compilation techniques, we describe how to write strongly typed programs that include a function that acts as a tracing ...
135 views 91 votes 15 years 7 months ago  CCS 2009»
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
187 views 121 votes 15 years 7 months ago  SECON 2007»
—Programming Wireless Sensor Network (WSN) applications is known to be a difficult task. Part of the problem is that the resource limitations of typical WSN nodes force programm...
118 views 96 votes 15 years 7 months ago  ASPLOS 2006»
Significant time is spent by companies trying to reproduce and fix bugs. BugNet and FDR are recent architecture proposals that provide architecture support for deterministic rep...
99 views 102 votes 15 years 6 months ago  ACMMSP 2005»
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
82 views 86 votes 15 years 6 months ago  AOSD 2005»
Even when working on a well-modularized software system, programmers tend to spend more time navigating the code than working with it. This phenomenon arises because it is impossi...
105 views 96 votes 15 years 6 months ago  SC 2004»
Improving program locality has become increasingly important on modern computer systems. An effective strategy is to group computations on the same data so that once the data are ...
98 views 102 votes 15 years 6 months ago  CP 2004»
Constraint programming is rapidly becoming the technology of choice for modeling and solving complex combinatorial problems. However, users of constraint programming technology nee...
211 views 116 votes 15 years 6 months ago  ITNG 2010»
—There are several institutions that accredit educational programs and require documentation to ensure that an educational program regularly meets certain criteria. This paper fo...
176 views 89 votes 15 years 6 months ago  TRUST 2010»
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...