Sciweavers

3889 search results - page 621 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
SIGSOFT
2007
ACM
16 years 4 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
SIGSOFT
2004
ACM
15 years 9 months ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...

Book
747views
17 years 15 days ago
Data Structures and Algorithms with Object-Oriented Design Patterns in C++
"This book is about the fundamentals of data structures and algorithms--the basic elements from which large and complex software artifacts are built. To develop a solid unders...
Bruno R. Preiss
TCAD
2002
98views more  TCAD 2002»
15 years 3 months ago
An Esterel compiler for large control-dominated systems
Embedded hard real-time software systems often need fine-grained parallelism and precise control of timing, things typical real-time operating systems do not provide. The Esterel l...
Stephen A. Edwards
SOCO
2007
Springer
15 years 10 months ago
Streamlining Feature-Oriented Designs
Abstract. Software development for embedded systems gains momentum but faces many challenges. Especially the constraints of deeply embedded systems, i.e., extreme resource and perf...
Martin Kuhlemann, Sven Apel, Thomas Leich