Sciweavers

3708 search results - page 96 / 742
» Programming with C Exceptions
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 6 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
124
Voted
BMCBI
2006
195views more  BMCBI 2006»
15 years 2 months ago
CAFTAN: a tool for fast mapping, and quality assessment of cDNAs
Background: The German cDNA Consortium has been cloning full length cDNAs and continued with their exploitation in protein localization experiments and cellular assays. However, t...
Coral del Val, Vladimir Yurjevich Kuryshev, Karl-H...
DATE
2009
IEEE
176views Hardware» more  DATE 2009»
15 years 9 months ago
Automated synthesis of streaming C applications to process networks in hardware
Abstract—The demand for embedded computing power is continuously increasing and FPGAs are becoming very interesting computing platforms, as they provide huge amounts of customiza...
Sven van Haastregt, Bart Kienhuis
DATE
2008
IEEE
103views Hardware» more  DATE 2008»
15 years 8 months ago
A Mutation Model for the SystemC TLM 2.0 Communication Interfaces
Mutation analysis is a widely-adopted strategy in software testing with two main purposes: measuring the quality of test suites, and identifying redundant code in programs. Simila...
Nicola Bombieri, Franco Fummi, Graziano Pravadelli
ISORC
2006
IEEE
15 years 8 months ago
Design Patterns for Releasing Applications in C++ Implementations of JTRS Software Communications Architecture
The Software Communications Architecture (SCA), which has been adopted as an SDR (Software Defined Radio) Forum standard, provides a framework that successfully exploits common de...
Michael Barth, Jonghun Yoo, Saehwa Kim, Seongsoo H...