Sciweavers

3872 search results - page 301 / 775
» The Java memory model
Sort
View
VMCAI
2010
Springer
16 years 1 months ago
Shape Analysis of Low-Level C with Overlapping Structures
Abstract. Device drivers often keep data in multiple data structures simultaneously while embedding list or tree related records into the records containing the actual data; this r...
Jörg Kreiker, Helmut Seidl, Vesal Vojdani
124
Voted
ECAL
2007
Springer
15 years 10 months ago
Developmental Neural Heterogeneity Through Coarse-Coding Regulation
Abstract. A coarse-coding regulatory model that facilitates neural heterogeneity through a morphogenetic process is presented. The model demonstrates cellular and tissue extensibil...
Jekanthan Thangavelautham, Gabriele M. T. D'Eleute...
127
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Referential semantic language modeling for data-poor domains
This paper describes a referential semantic language model that achieves accurate recognition in user-defined domains with no available domain-specific training corpora. This mo...
Stephen Wu, Lane Schwartz, William Schuler
136
Voted
CADE
2005
Springer
16 years 4 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
ECOOP
2005
Springer
15 years 9 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...