Sciweavers

1288 search results - page 125 / 258
» Visual Generalization in Programming by Example
Sort
View
PEPM
2010
ACM
15 years 11 months ago
Clone detection and elimination for Haskell
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code make...
Christopher Brown, Simon Thompson
FPGA
2003
ACM
125views FPGA» more  FPGA 2003»
15 years 8 months ago
I/O placement for FPGAs with multiple I/O standards
In this paper, we present the first exact algorithm to solve the constrained I/O placement problem for FPGAs that support multiple I/O standards. We derive a compact integer line...
Wai-Kei Mak
ICS
1997
Tsinghua U.
15 years 7 months ago
Iteration Space Slicing and Its Application to Communication Optimization
Program slicing is an analysis that answers questions such as \Which statements might a ect the computation of variable v at statement s?" or \Which statements depend on the ...
William Pugh, Evan Rosser
IJISEC
2007
149views more  IJISEC 2007»
15 years 2 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
ACSAC
2007
IEEE
15 years 9 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth