Sciweavers

506 search results - page 51 / 102
» Where Is the Value in a Program Verifier
Sort
View
TNN
2008
106views more  TNN 2008»
15 years 13 days ago
Stability and Hopf Bifurcation of a General Delayed Recurrent Neural Network
In this paper, stability and bifurcation of a general recurrent neural network with multiple time delays is considered, where all the variables of the network can be regarded as bi...
Wenwu Yu, Jinde Cao, Guanrong Chen
ICCD
2002
IEEE
88views Hardware» more  ICCD 2002»
15 years 9 months ago
Improving Processor Performance by Simplifying and Bypassing Trivial Computations
During the course of a program’s execution, a processor performs many trivial computations; that is, computations that can be simplified or where the result is zero, one, or equ...
Joshua J. Yi, David J. Lilja
187
Voted
POPL
2007
ACM
16 years 25 days ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
APLAS
2006
ACM
15 years 6 months ago
XML Validation for Context-Free Grammars
String expression analysis conservatively approximates the possible string values generated by a program. We consider the validation of a context-free grammar obtained by the analy...
Yasuhiko Minamide, Akihiko Tozawa
SAC
2010
ACM
15 years 7 months ago
Checking concurrent contracts with aspects
The applicability of aspects as a means of implementing runtime contract checking has been demonstrated in prior work, where contracts are identified as cross-cutting concerns [1...
Eric Kerfoot, Steve McKeever