Sciweavers

3792 search results - page 677 / 759
» Techniques for Trusted Software Engineering
Sort
View
CGO
2010
IEEE
15 years 4 months ago
Umbra: efficient and scalable memory shadowing
Shadow value tools use metadata to track properties of application data at the granularity of individual machine instructions. These tools provide effective means of monitoring an...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe
122
Voted
PASTE
1999
ACM
15 years 4 months ago
Identifying Procedural Structure in Cobol Programs
The principal control-flow abstraction mechanism in the Cobol language is the PERFORM statement. Normally, PERFORM statements are used in a straightforward manner to define para...
John Field, G. Ramalingam
ESEC
1999
Springer
15 years 4 months ago
Yesterday, My Program Worked. Today, It Does Not. Why?
Imagine some program and a number of changes. If none of these changes is applied (“yesterday”), the program works. If all changes are applied (“today”), the program does n...
Andreas Zeller
97
Voted
EUROMICRO
1998
IEEE
15 years 4 months ago
Retransmission Scheme for MPEG Streams in Mission Critical Multimedia Applications
Since multimedia data are characterized by continuity and massive volume, compression techniques such as MPEG are used for efficient transmission. However, a transmission error oc...
Sugh-Hoon Lee, Sungyoung Lee
AC
1998
Springer
15 years 4 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail