Sciweavers

787 search results - page 10 / 158
» Source code analysis and manipulation
Sort
View
ECRTS
1998
IEEE
15 years 1 months ago
Facilitating worst-case execution times analysis for optimized code
In this paper we present co-transformation, a novel approach to the mapping of execution information from the source code of a program to the object code for the purpose of worst-...
Jakob Engblom, Andreas Ermedahl, Peter Altenbernd
FCCM
2007
IEEE
100views VLSI» more  FCCM 2007»
15 years 3 months ago
A Library and Platform for FPGA Bitstream Manipulation
— Since 1998, no commercially available FPGA has been accompanied by public documentation of its native machine code (or bitstream) format. Consequently, research in reconfigura...
Adam Megacz
IWPC
2009
IEEE
15 years 4 months ago
Natural language parsing for fact extraction from source code
We present a novel approach to extract structural information from source code using state-of-the-art parser technologies for natural languages. The parser technology is robust in...
Jens Nilsson, Welf Löwe, Johan Hall, Joakim N...
SCAM
2008
IEEE
15 years 4 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
RTAS
1996
IEEE
15 years 1 months ago
Supporting the specification and analysis of timing constraints
Real-time programmers have to deal with the problem of relating timing constraints associated with source code to sequences of machine instructions. This paper describes an enviro...
Lo Ko, Christopher A. Healy, Emily Ratliff, Robert...