Sciweavers

1356 search results - page 39 / 272
» The ideal of verified software
Sort
View
OSDI
2006
ACM
16 years 2 days ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
ESEC
1997
Springer
15 years 3 months ago
Applying Static Analysis to Software Architectures
Abstract. In this paper we demonstrate how static concurrency analysis techniques can be used to verify application-specific properties of an architecture description. Specifically...
Gleb Naumovich, George S. Avrunin, Lori A. Clarke,...
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 3 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 4 months ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson
OOPSLA
2009
Springer
15 years 4 months ago
Software evolution and the moving picture metaphor
Software systems evolve over time. Currently we do not do a good job of documenting this evolution. This essay discusses the need to better document software evolution and introdu...
Mark Mahoney