Sciweavers

458 search results - page 17 / 92
» Symbolic Object Code Analysis
Sort
View
ESOP
2001
Springer
15 years 2 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
TCOM
2008
100views more  TCOM 2008»
14 years 9 months ago
On the performance of concatenated convolutional code and Alamouti space-time code with noisy channel estimates and finite-depth
Abstract--In this paper, performance of the Alamouti spacetime code (STC) [1] and performance of the concatenation between the convolutional code and the Alamouti STC are derived. ...
Jittra Jootar, James R. Zeidler, John G. Proakis
CODES
2009
IEEE
15 years 4 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...
IASTEDSEA
2004
14 years 11 months ago
ARIES: Refactoring support environment based on code clone analysis
Code clone has been regarded as one of factors that make software maintenance more difficult. A code clone is a code fragment in a source code that is identical or similar to anot...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...
PASTE
2005
ACM
15 years 3 months ago
Generalizing symbolic execution to library classes
Forward symbolic execution is a program analysis technique that allows using symbolic inputs to explore program executions. The traditional applications of this technique have foc...
Sarfraz Khurshid, Yuk Lai Suen