Sciweavers

3889 search results - page 220 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
ICSE
1997
IEEE-ACM
15 years 8 months ago
Visualizing Interactions in Program Executions
Implementing, validating, modifying, or reengineering an object-oriented system requires an understanding of the object and class interactions which occur as a program executes. T...
Dean F. Jerding, John T. Stasko, Thomas Ball
SIGSOFT
2006
ACM
16 years 5 months ago
Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation
Pervasive context-aware software is an emerging kind of application. Smart personal digital assistants and RFID-based location sensing software are two examples. Many of these sys...
Heng Lu, W. K. Chan, T. H. Tse
LCTRTS
2007
Springer
15 years 10 months ago
Addressing instruction fetch bottlenecks by using an instruction register file
The Instruction Register File (IRF) is an architectural extension for providing improved access to frequently occurring instructions. An optimizing compiler can exploit an IRF by ...
Stephen Roderick Hines, Gary S. Tyson, David B. Wh...
ISSTA
2000
ACM
15 years 8 months ago
Which pointer analysis should I use?
During the past two decades many di erent pointer analysis algorithms have been published. Although some descriptions include measurements of the e ectiveness of the algorithm, qu...
Michael Hind, Anthony Pioli
AMAST
2004
Springer
15 years 9 months ago
A Generic Software Safety Document Generator
Abstract. Formal certification is based on the idea that a mathematical proof of some property of a piece of software can be regarded as a certificate of correctness which, in pr...
Ewen Denney, Ram Prasad Venkatesan