Sciweavers

4716 search results - page 904 / 944
» Tangible functional programming
Sort
View
ACMSE
2006
ACM
15 years 3 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
CASES
2006
ACM
15 years 3 months ago
Integrated scratchpad memory optimization and task scheduling for MPSoC architectures
Multiprocessor system-on-chip (MPSoC) is an integrated circuit containing multiple instruction-set processors on a single chip that implements most of the functionality of a compl...
Vivy Suhendra, Chandrashekar Raghavan, Tulika Mitr...
SAC
2006
ACM
15 years 3 months ago
Evaluation of rule-based modularization in model transformation languages illustrated with ATL
This paper studies ways for modularizing transformation definitions in current rule-based model transformation languages. Two scenarios are shown in which the modular units are id...
Ivan Kurtev, Klaas van den Berg, Fréd&eacut...
BROADNETS
2005
IEEE
15 years 3 months ago
Multi-rate throughput optimization for wireless local area network anomaly problem
— Due to varying wireless channel conditions, the IEEE 802.11 wireless local area network (WLAN) standard supports multiple modulation types to accommodate the tradeoff between d...
Yu-Liang Kuo, Kun-Wei Lai, Frank Yeong-Sung Lin, Y...
ECRTS
2005
IEEE
15 years 3 months ago
Applying Static WCET Analysis to Automotive Communication Software
The number of embedded computers used in modern cars have increased dramatically during the last years, as they provide increased functionality to a reduced cost compared to previ...
Susanna Byhlin, Andreas Ermedahl, Jan Gustafsson, ...