Sciweavers

861 search results - page 92 / 173
» Symbolic Program Analysis Using Term Rewriting and Generaliz...
Sort
View
CODES
2003
IEEE
15 years 8 months ago
Accurate estimation of cache-related preemption delay
Multitasked real-time systems often employ caches to boost performance. However the unpredictable dynamic behavior of caches makes schedulability analysis of such systems difficul...
Hemendra Singh Negi, Tulika Mitra, Abhik Roychoudh...
SIGSOFT
2007
ACM
16 years 3 months ago
RELAY: static race detection on millions of lines of code
Data races occur when multiple threads are about to access the same piece of memory, and at least one of those accesses is a write. Such races can lead to hard-to-reproduce bugs t...
Jan Wen Voung, Ranjit Jhala, Sorin Lerner
147
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
IPSN
2007
Springer
15 years 9 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
SIGSOFT
2005
ACM
16 years 3 months ago
Matching execution histories of program versions
We develop a method for matching dynamic histories of program executions of two program versions. The matches produced can be useful in many applications including software piracy...
Xiangyu Zhang, Rajiv Gupta