Sciweavers

2236 search results - page 291 / 448
» Secure Software Design in Practice
Sort
View
SCAM
2005
IEEE
15 years 3 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
EUC
2005
Springer
15 years 3 months ago
Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments
In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services with respect...
Kwang-il Hwang, Won-Hee Lee, Seok-hwan Kim, Doo Se...
ADAEUROPE
2004
Springer
15 years 3 months ago
Teaching Real-Time Systems Around a Digital Model Railroad Platform Using Ada
Abstract. This paper describes a laboratory equipped for the teaching of realtime systems. The laboratory has been built around a Digital Model Railroad Platform and it allows the ...
Bárbara Álvarez, Juan A. Pastor, Fra...
KBSE
2003
IEEE
15 years 3 months ago
Parallel Breadth-First Search LTL Model-Checking
We propose a practical parallel on-the-fly algorithm for enumerative LTL model-checking. The algorithm is designed for a cluster of workstations communicating via MPI. The detect...
Jiri Barnat, Lubos Brim, Jakub Chaloupka
IPPS
1998
IEEE
15 years 2 months ago
Toward Embedded Development from Advanced Khoros
Current practice in the design of application software for high-performance embedded computing systems is characterized by long development times, lack of interoperability with ot...
Joe Fogler, Thomas Robey, Mark Young