Sciweavers

1045 search results - page 29 / 209
» The Use of Exceptions
Sort
View
JAVA
1999
Springer
15 years 2 months ago
Design, Implementation, and Evaluation of Optimizations in a Just-in-Time Compiler
The Java language incurs a runtime overhead for exception checks and object accesses without an interior pointer in order to ensure safety. It also requires type inclusion test, d...
Kazuaki Ishizaki, Motohiro Kawahito, Toshiaki Yasu...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 1 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
ICASSP
2008
IEEE
15 years 4 months ago
Throughput analysis of wireless mesh networks
Wireless mesh networks are rapidly deployable for many applications. The throughput of such a network depends on the schemes used for medium access control. In this paper, we pres...
Yuan Yu, Yi Huang, Bin Zhao, Yingbo Hua
WCRE
1995
IEEE
15 years 1 months ago
On Finding Duplication and Near-Duplication in Large Software Systems
This paper describes how a program called dup can be used to locate instances of duplication or nearduplication in a software system. D u p reports both textually identical sectio...
Brenda S. Baker
AAAI
1994
14 years 11 months ago
A Preference-Based Approach to Default Reasoning: Preliminary Report
An approach to nonmonotonic inference, based on preference orderings between possible worlds or states of affairs, is presented. We begin with an extant weak theory of default con...
James P. Delgrande