Sciweavers

2902 search results - page 494 / 581
» Software Product Lines
Sort
View
DSN
2005
IEEE
15 years 5 months ago
Checking Array Bound Violation Using Segmentation Hardware
The ability to check memory references against their associated array/buffer bounds helps programmers to detect programming errors involving address overruns early on and thus avo...
Lap-Chung Lam, Tzi-cker Chiueh
MM
2004
ACM
160views Multimedia» more  MM 2004»
15 years 5 months ago
New ways of worldmaking: the Alterne platform for VR art
We introduce a novel approach to the creation of Virtual Reality Art installations, which supports the design of alternative worlds, in which laws of Physics can be redefined to i...
Marc Cavazza, Jean-Luc Lugrin, Simon Hartley, Paol...
LCTRTS
2004
Springer
15 years 5 months ago
Spinach: a liberty-based simulator for programmable network interface architectures
This paper presents Spinach, a new simulator toolset specifically designed to target programmable network interface architectures. Spinach models both system components that are ...
Paul Willmann, Michael Brogioli, Vijay S. Pai
XPU
2004
Springer
15 years 5 months ago
An Agile Approach to a Legacy System
We describe how a small, successful, self-selected XP team approached a seemingly intractable problem with panache, flair and immodesty. We rewrote a legacy application by deliver...
Chris Stevenson, Andy Pols
CCS
2003
ACM
15 years 5 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...