Sciweavers

4126 search results - page 447 / 826
» Set based logic programming
Sort
View
HPCC
2007
Springer
15 years 10 months ago
Journal Remap-Based FTL for Journaling File System with Flash Memory
Abstract. Constructing flash memory based storage, FTL (Flash Translation Layer) manages mapping between logical address and physical address. Since FTL writes every data to new r...
Seung Ho Lim, Hyun-Jin Choi, Kyu Ho Park
CADE
2008
Springer
16 years 4 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
COMPSAC
2003
IEEE
15 years 9 months ago
Automated Metamorphic Testing
Usual techniques for automatic test data generation are based on the assumption that a complete oracle will be available during the testing process. However, there are programs fo...
Arnaud Gotlieb, Bernard Botella
SCAM
2003
IEEE
15 years 9 months ago
Unique Renaming of Java Using Source Transformation
This paper presents a flexible way in which a deisgn model extracted from Java programs can remain unified with the source code. Each entity declaration and reference in the Java ...
Xinping Guo, James R. Cordy, Thomas R. Dean
LOPSTR
2001
Springer
15 years 8 months ago
On Deforesting Parameters of Accumulating Maps
Abstract. Deforestation is a well-known program transformation technique which eliminates intermediate data structures that are passed between functions. One of its weaknesses is t...
Kazuhiko Kakehi, Robert Glück, Yoshihiko Futa...