Sciweavers

3889 search results - page 609 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
ICSE
2007
IEEE-ACM
16 years 4 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
WOSP
2010
ACM
15 years 11 months ago
A page fault equation for dynamic heap sizing
For garbage-collected applications, dynamically-allocated objects are contained in a heap. Programmer productivity improves significantly if there is a garbage collector to autom...
Y. C. Tay, X. R. Zong
KBSE
2009
IEEE
15 years 11 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
119
Voted
COMPSAC
2007
IEEE
15 years 10 months ago
A Service Discovery Architecture based on Anycast in Pervasive Computing Environments
Service discovery is very useful in pervasive computing environments. A service discovery architecture based on anycast is proposed. A wellknown anycast address is defined first, ...
Li Zhang, Zhen-lian Shi, Qi Shen
WCRE
2002
IEEE
15 years 9 months ago
Register Liveness Analysis for Optimizing Dynamic Binary Translation
Dynamic binary translators compile machine code from a source architecture to a target architecture at run time. Due to the hard time constraints of just-in-time compilation only ...
Mark Probst, Andreas Krall, Bernhard Scholz