Sciweavers

2943 search results - page 296 / 589
» Software Implementation of Synchronous Programs
Sort
View
SCAM
2008
IEEE
15 years 9 months ago
Automatic Determination of May/Must Set Usage in Data-Flow Analysis
Data-flow analysis is a common technique to gather program information for use in transformations such as register allocation, dead-code elimination, common subexpression elimina...
Andrew Stone, Michelle Strout, Shweta Behere
SRDS
2003
IEEE
15 years 8 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
140
Voted
FOSSACS
2008
Springer
15 years 5 months ago
Erasure and Polymorphism in Pure Type Systems
We introduce Erasure Pure Type Systems, an extension to Pure Type Systems with an erasure semantics centered around a type constructor indicating parametric polymorphism. The eras...
Nathan Mishra-Linger, Tim Sheard
CSIE
2009
IEEE
15 years 10 months ago
A Metamodel for Tracing Non-functional Requirements
The tendency for Non-Functional Requirements (NFRs) to have a wide-ranging impact on a software system, and the strong interdependencies and tradeoffs that exist between NFRs and ...
Mohamad Kassab, Olga Ormandjieva, Maya Daneva
125
Voted
IWPC
2002
IEEE
15 years 8 months ago
Lightweight Impact Analysis using Island Grammars
Impact analysis is needed for the planning and estimation of software maintenance projects. Traditional impact analysis techniques tend to be too expensive for this phase, so ther...
Leon Moonen