Sciweavers

3889 search results - page 618 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
CF
2010
ACM
15 years 9 months ago
Enabling a highly-scalable global address space model for petascale computing
Over the past decade, the trajectory to the petascale has been built on increased complexity and scale of the underlying parallel architectures. Meanwhile, software developers hav...
Vinod Tipparaju, Edoardo Aprà, Weikuan Yu, ...
HPCA
2008
IEEE
16 years 4 months ago
Uncovering hidden loop level parallelism in sequential applications
As multicore systems become the dominant mainstream computing technology, one of the most difficult challenges the industry faces is the software. Applications with large amounts ...
Hongtao Zhong, Mojtaba Mehrara, Steven A. Lieberma...
COMPSAC
2008
IEEE
15 years 10 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
CSMR
2006
IEEE
15 years 10 months ago
A Language Independent Framework for Context-sensitive Formatting
Automated formatting is an important technique for the software maintainer. It is either applied separately to improve the readability of source code, or as part of a source code ...
M. G. J. van den Brand, A. Taeke Kooiker, Jurgen J...
ACL2
2006
ACM
15 years 10 months ago
Reasoning about ACL2 file input
We introduce the logical story behind file input in ACL2 and discuss the types of theorems that can be proven about filereading operations. We develop a low level library for re...
Jared Davis