|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 33114 occurrences of 8244 keywords
|
|
|
Results
Found 58093 publication records. Showing 58080 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Scott Sirowy, Greg Stitt, Frank Vahid |
C is for circuits: capturing FPGA circuits as sequential code for portability. |
FPGA |
2008 |
DBLP DOI BibTeX RDF |
sequential code, FPGA, synthesis, portability, circuit design |
17 | Thais Castro, Hugo Fuks, Alberto Nogueira de Castro Júnior |
Detecting Code Evolution in Programming Learning. |
SBIA |
2008 |
DBLP DOI BibTeX RDF |
Supporting Strategies for Code Evolution, Knowledge Representation, Programming Learning |
17 | Thomas Weigert, Frank Weil, Aswin van den Berg, Paul Dietz, Kevin Marth |
Automated Code Generation for Industrial-Strength Systems. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
program transformation, code generation, Model-driven engineering |
17 | Christopher Dragert, Jürgen Dingel, Karen Rudie |
Generation of concurrency control code using discrete-event systems theory. |
SIGSOFT FSE |
2008 |
DBLP DOI BibTeX RDF |
concurrency, model-driven development, control theory, discrete-event systems, automatic code generation |
17 | Wojciech Jaskowski, Krzysztof Krawiec, Bartosz Wieloch |
Multi-task code reuse in genetic programming. |
GECCO (Companion) |
2008 |
DBLP DOI BibTeX RDF |
genetic programming, code reuse, multi-task learning |
17 | Mohd Fadzli Marhusin, David Cornforth, Henry Larkin |
Malicious Code Detection Architecture Inspired by Human Immune System. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
System Call, Malicious Code Detection |
17 | Javed Ferzund, Syed Nadeem Ahsan, Franz Wotawa |
Analysing Bug Prediction Capabilities of Static Code Metrics in Open Source Software. |
IWSM/Metrikon/Mensura |
2008 |
DBLP DOI BibTeX RDF |
Bug predictor, static code metrics, open source software, empirical software engineering |
17 | Harry M. Sneed |
Measuring 75 Million Lines of Code. |
IWSM/Metrikon/Mensura |
2008 |
DBLP DOI BibTeX RDF |
Code measurement, complexity and quality metrics, metric database, metric evaluation, size, ISO-9126 |
17 | Jérémy Buisson, Fabien Dagnat |
Introspecting Continuations in Order to Update Active Code. |
HotSWUp |
2008 |
DBLP DOI BibTeX RDF |
DSU, dynamic update of active code, introspection of execution states, typing, continuation, language construct, control operator |
17 | Zhonglei Wang, Antonio Sánchez, Andreas Herkersdorf |
SciSim: a software performance estimation framework using source code instrumentation. |
WOSP |
2008 |
DBLP DOI BibTeX RDF |
debugging information, software performance estimation, source code instrumentation, microarchitecture |
17 | Takayuki Omori, Katsuhisa Maruyama |
A change-aware development environment by recording editing operations of source code. |
MSR |
2008 |
DBLP DOI BibTeX RDF |
source code modification, versioning systems, software evolution, integrated development environments |
17 | Shao-Yang Wang, Rong-Guey Chang |
Code size reduction by compressing repeated instruction sequences. |
J. Supercomput. |
2007 |
DBLP DOI BibTeX RDF |
Repeated instruction sequence, Index table, Instruction table, Register bank, Code compression, Decompression, Instruction prefetching |
17 | R. Krishnan, S. Murali Krishna, Nishil Bharill |
Code quality tools: learning from our experience. |
ACM SIGSOFT Softw. Eng. Notes |
2007 |
DBLP DOI BibTeX RDF |
buffer overflow and memory corruption, memory leak, code quality |
17 | Beat Fluri, Michael Würsch, Martin Pinzger 0001, Harald C. Gall |
Change Distilling: Tree Differencing for Fine-Grained Source Code Change Extraction. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
Source code change extraction, tree differencing algorithms, software evolution analysis, software repositories |
17 | Coen De Roover, Theo D'Hondt, Johan Brichau, Carlos Noguera, Laurence Duchien |
Behavioral similarity matching using concrete source code templates in logic queries. |
PEPM |
2007 |
DBLP DOI BibTeX RDF |
logic meta programming, program querying, source code templates, program analysis, pattern detection, program validation |
17 | Sue Jane Jones, Gary E. Burnett |
Spatial skills and navigation of source code. |
ITiCSE |
2007 |
DBLP DOI BibTeX RDF |
navigation of source code, programming ability, spatial skills, education |
17 | Hanno Scharwächter, Jonghee M. Youn, Rainer Leupers, Yunheung Paek, Gerd Ascheid, Heinrich Meyr |
A code-generator generator for multi-output instructions. |
CODES+ISSS |
2007 |
DBLP DOI BibTeX RDF |
ISS, code-selection, compiler/architecture co-design, ASIP |
17 | Hayo Thielecke |
Frame rules from answer types for code pointers. |
POPL |
2006 |
DBLP DOI BibTeX RDF |
code pointers, polymorphism, continuations, Hoare logic, typed assembly language |
17 | Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari |
New Malicious Code Detection Using Variable Length n-grams. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Episodes, Data Mining, n-grams, Malicious code detection |
17 | Yuji Ayatsuka, Jun Rekimoto |
Active CyberCode: a directly controllable 2D code. |
CHI Extended Abstracts |
2006 |
DBLP DOI BibTeX RDF |
2D code, CyberCode, direct manipulation |
17 | Bernhard Egger 0002, Chihun Kim, Choonki Jang, Yoonsung Nam, Jaejin Lee, Sang Lyul Min |
A dynamic code placement technique for scratchpad memory using postpass optimization. |
CASES |
2006 |
DBLP DOI BibTeX RDF |
embedded systems, compilers, scratchpad memory, demand paging, code placement, postpass optimization, heterogeneous memory |
17 | Jae-Min Seol, Seong-Whan Kim |
Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
anti-collusion code, Scalable, digital fingerprinting |
17 | Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto |
Analyzing individual performance of source code review using reviewers' eye movement. |
ETRA |
2006 |
DBLP DOI BibTeX RDF |
source code review, human factor, eye movement, computer program |
17 | Zhen Ming Jiang, Ahmed E. Hassan |
Examining the evolution of code comments in PostgreSQL. |
MSR |
2006 |
DBLP DOI BibTeX RDF |
code comments, software maintenance, software evolution |
17 | Taekyung Kim, Taesuk Oh, Yong Cheol Kim, Seong Jong Choi |
Dirty-Paper Trellis-Code Watermarking with Orthogonal Arcs. |
PSIVT |
2006 |
DBLP DOI BibTeX RDF |
informed watermarking, orthogonal arc, trellis-code |
17 | Jon Whittle 0001, Richard Kwan, Jyoti Saboo |
From scenarios to code: An air traffic control case study. |
Softw. Syst. Model. |
2005 |
DBLP DOI BibTeX RDF |
Code generation, Scenario, Case study, State machine, Software modeling |
17 | Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits, Koen De Bosschere |
LANCET: a nifty code editing tool. |
PASTE |
2005 |
DBLP DOI BibTeX RDF |
optimization, visualization, instrumentation, assembler, binary code |
17 | Alexander Joseph Ahern, Nobuko Yoshida |
Formalising Java RMI with explicit code mobility. |
OOPSLA |
2005 |
DBLP DOI BibTeX RDF |
Java, distribution, optimisation, types, runtime, RMI, code mobility |
17 | Mark W. Bailey |
IRONCODE: think-twice, code-once programming. |
SIGCSE |
2005 |
DBLP DOI BibTeX RDF |
correct code, program reading, program writing |
17 | Youfeng Wu, Maurício Breternitz Jr., Herbert H. J. Hum, Ramesh V. Peri, Jay Pickett |
Enhanced code density of embedded CISC processors with echo technology. |
CODES+ISSS |
2005 |
DBLP DOI BibTeX RDF |
CISC processors, echo technology, embedded systems, compression, code density |
17 | Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen |
Assessment of Palm OS Susceptibility to Malicious Code Threats. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
mobile operating systems, Palm OS, worms, malicious code |
17 | Meilin Liu, Qingfeng Zhuge, Zili Shao, Chun Xue, Mei Kang Qiu, Edwin Hsing-Mean Sha |
Loop Distribution and Fusion with Timing and Code Size Optimization for Embedded DSPs. |
EUC |
2005 |
DBLP DOI BibTeX RDF |
Loop Distribution, Embedded DSP, Scheduling, Code Size, Loop Fusion |
17 | Xiang-Yang Li 0001, Peng-Jun Wan |
Theoretically Good Distributed CDMA/OVSF Code Assignment for Wireless Ad Hoc Networks. |
COCOON |
2005 |
DBLP DOI BibTeX RDF |
CDMA code assignment, wireless networks, throughput, coloring, interference, bottleneck |
17 | Colin D. Walter |
Simple Power Analysis of Unified Code for ECC Double and Add. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication |
17 | Alastair Dunsmore, Marc Roper, Murray Wood |
The Development and Evaluation of Three Diverse Techniques for Object-Oriented Code Inspection. |
IEEE Trans. Software Eng. |
2003 |
DBLP DOI BibTeX RDF |
Object-oriented, empirical study, software inspection, code reviews |
17 | Jong-Yeol Lee, In-Cheol Park |
Address code generation for DSP instruction-set architectures. |
ACM Trans. Design Autom. Electr. Syst. |
2003 |
DBLP DOI BibTeX RDF |
auto-modification addressing, cycle counts, Code size |
17 | Martin E. Nordberg III |
Managing Code Ownership. |
IEEE Softw. |
2003 |
DBLP DOI BibTeX RDF |
software process, software development management, Code ownership |
17 | Qingfeng Zhuge, Zili Shao, Bin Xiao 0001, Edwin Hsing-Mean Sha |
Design space minimization with timing and code size optimization for embedded DSP. |
CODES+ISSS |
2003 |
DBLP DOI BibTeX RDF |
retiming, unfolding, code size reduction, DSP processors |
17 | Robert Krovetz, Secil Ugurel, C. Lee Giles |
Classification of source code archives. |
SIGIR |
2003 |
DBLP DOI BibTeX RDF |
source code archive, classification, SVM, software reuse |
17 | Kim Mens, Bernard Poll, Sebastián González |
Using Intentional Source-Code Views to Aid Software Maintenance. |
ICSM |
2003 |
DBLP DOI BibTeX RDF |
intentional source-code views, logic metaprogramming, Software maintenance, tool support |
17 | Hillery C. Hunter, Wen-mei W. Hwu |
Code coverage and input variability: effects on architecture and compiler research. |
CASES |
2002 |
DBLP DOI BibTeX RDF |
architecture, compiler, benchmarks, DSP, telecommunications, code coverage |
17 | Yunjian Jiang, Robert K. Brayton |
Logic optimization and code generation for embedded control applications. |
CODES |
2001 |
DBLP DOI BibTeX RDF |
code generation, MDD, Esterel, logic optimization, multiple-valued |
17 | Cecilia Metra, Jien-Chung Lo |
Intermediacy Prediction for High Speed Berger Code Checkers. |
J. Electron. Test. |
2000 |
DBLP DOI BibTeX RDF |
self-checking circuits, checkers, Berger code |
17 | Shail Aditya, Scott A. Mahlke, B. Ramakrishna Rau |
Code size minimization and retargetable assembly for custom EPIC and VLIW instruction formats. |
ACM Trans. Design Autom. Electr. Syst. |
2000 |
DBLP DOI BibTeX RDF |
code size minimization, custom templates, instruction format design, noop compression, retargetable assembly, VLIW, design automation, EPIC |
17 | Zen Chen, I-Pin Chen |
Recursive Conversion of Chain Code into Quadtree with Table Lookup. |
ICPR |
2000 |
DBLP DOI BibTeX RDF |
Recursive conversion, Quadtree, Table lookup, Chain Code |
17 | Liliana Favre, Liliana Martinez, Claudia Pereira |
Transforming UML Static Models into Object-Oriented Code. |
TOOLS (37) |
2000 |
DBLP DOI BibTeX RDF |
UML static models, reuse based rigorous method, object oriented code generation, rigorous process, GSBL/sup OO/ language, SpReIm model, OCL specifications, object-oriented programming, software maintenance, software maintenance, specification languages, software reusability, program compilers, object-oriented languages, algebraic specification, algebraic specifications, reusable components, UML class diagrams, forward engineering, design artifacts |
17 | William Currie Colket |
Code analysis of saftey-critical and real-time software using ASIS. |
SIGAda |
1999 |
DBLP DOI BibTeX RDF |
real-time, tasking, safety-critical, code analysis, ASIS, high integrity, Ada language, Ravenscar profile |
17 | Colin O'Halloran, Alf Smith |
Verification of Picture Generated Code. |
ASE |
1999 |
DBLP DOI BibTeX RDF |
Ada, Z, Automatic Code Generation, Proof, Simulink, SPARK, Control Laws |
17 | Oliver Rüthing |
Optimal Code Motion in the Presence of Large Expressions. |
ICCL |
1998 |
DBLP DOI BibTeX RDF |
partial redundancy, graph theory, register allocation, graph matching, program optimization, code motion, elimination |
17 | Tommy Thorne |
Programming Languages for Mobile Code. |
ACM Comput. Surv. |
1997 |
DBLP DOI BibTeX RDF |
Limbo, Obliq, Safe-Tcl, telescript, security, Java, formal methods, object orientation, distribution, safety, portability, mobile code, network programming, Objective Caml |
17 | Andreas Schade |
Automatic Generation of Bridging Code for Accessing C++ from Java. |
TOOLS (25) |
1997 |
DBLP DOI BibTeX RDF |
Language mapping, Representative classes, Code generation |
17 | Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang |
Instruction selection using binate covering for code size optimization. |
ICCAD |
1995 |
DBLP DOI BibTeX RDF |
code generation, digital signal processors, instruction selection |
17 | Eugene Joseph, Theodosios Pavlidis |
Bar Code Waveform Recognition Using Peak Locations. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1994 |
DBLP DOI BibTeX RDF |
bar code waveform recognition, peak locations, blurred waveforms, blurring process, waveform peaks, waveform deblurring, edge detection, parameter estimation, statistical analysis, histogram, statistical pattern recognition, zero crossings, noise tolerance, bar codes, edge features |
17 | Jens Knoop, Oliver Rüthing, Bernhard Steffen |
Optimal Code Motion: Theory and Practice. |
ACM Trans. Program. Lang. Syst. |
1994 |
DBLP DOI BibTeX RDF |
t-refined flow graphs, critical edges, elimination of partial redundancies, lifetimes of registers, nondeterministic flowgraphs, data flow analysis, code motion, lifetime optimality, computational optimality |
17 | Chen Wei, Hong Nie, Zhizhang (David) Chen |
Non-Data-Aided Code Synchronization for the Code-Shifted Reference Ultra-Wideband (UWB) System. |
CNSR |
2010 |
DBLP DOI BibTeX RDF |
Code-shifted reference, synchronization, ultra wideband, Euclidean distance, impulse radio |
17 | Dejan Baca |
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
dua, security, data flow, coverity, Static code analysis, taint analysis, findbugs |
17 | Siamak Najjar Karimi, Saeed Parsa |
Semi-automatic Transformation of Sequential Code to Distributed Code Using Model Driven Architecture Approach. |
ISPA |
2009 |
DBLP DOI BibTeX RDF |
Model Driven Architecture, PIM, PSM, distributed code |
17 | Liz Burd, Stephen Rank |
Using Automated Source Code Analysis for Software Evolution. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
Evolution, Source Code Analysis, Call-Graph, Dominance Tree |
17 | Chryssis Georgiou, Nancy A. Lynch, Panayiotis Mavrommatis, Joshua A. Tauber |
Automated implementation of complex distributed algorithms specified in the IOA language. |
Int. J. Softw. Tools Technol. Transf. |
2009 |
DBLP DOI BibTeX RDF |
Input/Output automata, Verifiable distributed code, IOA Toolkit, Formal methods, Automated code generator |
17 | Claude Castelluccia, Aurélien Francillon, Daniele Perito, Claudio Soriente |
On the difficulty of software-based attestation of embedded devices. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
indisputable code execution, return-oriented programming, software-based attestation, swatt, wireless sensor networks, embedded systems, code compression |
17 | Santonu Sarkar, Renuka Sindhgatta, Krishnakumar Pooloth |
A collaborative platform for application knowledge management in software maintenance projects. |
Bangalore Compute Conf. |
2008 |
DBLP DOI BibTeX RDF |
distributed maintenance, collaboration, code analysis, code search |
17 | Suresh Thummalapenta, Tao Xie 0001 |
SpotWeb: detecting framework hotspots via mining open source repositories on the web. |
MSR |
2008 |
DBLP DOI BibTeX RDF |
code search engine, hotspots, code reuse |
17 | Brenda S. Baker |
Finding Clones with Dup: Analysis of an Experiment. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
softwareclones, duplicated code, Redundant code |
17 | Vladimir D. Tonchev, Hao Wang |
An algorithm for optimal difference systems of sets. |
J. Comb. Optim. |
2007 |
DBLP DOI BibTeX RDF |
Code synchronization, Comma-free code, Difference system of sets, Cyclic difference set |
17 | Lingxiao Jiang, Zhendong Su 0001, Edwin Chiu |
Context-based detection of clone-related bugs. |
ESEC/SIGSOFT FSE |
2007 |
DBLP DOI BibTeX RDF |
code clone detection, code clone-related bugs, context-based bug detection, inconsistencies |
17 | Bingyu Liao, Hong Yuan, Baojun Lin |
Smoother and Bayesian filter based semi-codeless tracking of dual-frequency GPS signals. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
P(Y) code, W code, A/S technology, adapted median filter, GPS, Bayesian filter |
17 | Koichi Kamijo, Noboru Kamijo, Masaharu Sakamoto |
Electronic clipping system with invisible barcodes. |
ACM Multimedia |
2006 |
DBLP DOI BibTeX RDF |
2D bar code, invisible ink, uv LED, ubiquitous, cell phone, QR code |
17 | E. J. Cheon, Takao Kato, Seon Jeong Kim |
Nonexistence of [n, 5, d]q Codes Attaining the Griesmer Bound for q4-2q2-2q+1 <= d <= q4-2q2-q. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
projective code, linear code, projective space, Griesmer bound |
17 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
17 | Søren Debois |
Imperative program optimization by partial evaluation. |
PEPM |
2004 |
DBLP DOI BibTeX RDF |
loop-invariant code motion, bisimulation, strength reduction, code duplication |
17 | Ramaswamy Govindarajan, Hongbo Yang, José Nelson Amaral, Chihong Zhang, Guang R. Gao |
Minimum Register Instruction Sequencing to Reduce Register Spills in Out-of-Order Issue Superscalar Architectures. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
code sequence optimization, code generation, Compiler optimization, instruction level parallelism, register allocation, instruction scheduling, superscalar architectures |
17 | Roy Friedman, Achour Mostéfaoui, Sergio Rajsbaum, Michel Raynal |
Distributed Agreement and Its Relation with Error-Correcting Codes. |
DISC |
2002 |
DBLP DOI BibTeX RDF |
Erroneous Value, Fault-Tolerance, Distributed Computing, Error-Correcting Code, Consensus, Hamming Distance, Asynchronous Distributed System, Condition, Crash Failure, Code Theory, Interactive Consistency |
17 | Gérard D. Cohen, Iiro S. Honkala, Antoine Lobstein, Gilles Zémor |
On Codes Identifying Vertices in the Two-Dimensional Square Lattice with Diagonals. |
IEEE Trans. Computers |
2001 |
DBLP DOI BibTeX RDF |
square lattice, identifying code, Graph, code |
17 | Guang Yang, Ivan Tomek |
Team Lab: A Collaborative Environment for Teamwork. |
CRIWG |
2000 |
DBLP DOI BibTeX RDF |
Team Lab, geographical separation, code development, concurrent programming activity, central code repository, software development, efficiency, programming environments, quality, productivity, collaborative virtual environment, teamwork, collaborative environment, client-server application, software development teams |
17 | Xinan Tang, Rakesh Ghiya, Laurie J. Hendren, Guang R. Gao |
Heap Analysis and Optimizations for Threaded Programs. |
IEEE PACT |
1997 |
DBLP DOI BibTeX RDF |
threaded programs, traditional compiler optimizations, loop invariant removal, common sub-expression elimination, dynamically allocated data structures, heap pointer analyses, dependence testing, high quality code generation, EARTH-C compiler, generated multithreaded code, dynamic measurements, performance tradeoffs, optimizations, parallel programming, optimizing compilers, multithreaded architectures, multithreaded programs, heap analysis |
17 | Jeffrey K. Hollingsworth, Barton P. Miller, M. J. R. Goncalves, Oscar Naim, Zhichen Xu, Ling Zheng |
MDL: A Language and Compiler for Dynamic Program Instrumentation. |
IEEE PACT |
1997 |
DBLP DOI BibTeX RDF |
dynamic program instrumentation, running programs, instrumentation code, PA-RISC, Power 2 architecture, Alpha architecture, x86 architecture, Metric Description Language, Paradyn Parallel Performance Tools, platform independent descriptions, message channels, modules, MDL, nodes, procedures, application program, compiler generators, SPARC, files, dynamic code generation, performance data |
17 | Seongbae Park, SangMin Shim, Soo-Mook Moon |
Evaluation of Scheduling Techniques on a SPARC-based VLIW Testbed. |
MICRO |
1997 |
DBLP DOI BibTeX RDF |
SPARC-based VLIW testbed, VLIW microprocessors, Very Long Instruction Word microprocessors, all-path speculation, gcc-generated optimized SPARC code, high-performance VLIW code, nongreedy enhanced pipeline scheduling, nonspeculative operations, profile-based all-path speculation, restricted speculative loads, scheduling compiler, speculative operations, trace-based speculation, performance, compiler, computer architecture, parallel machines, software pipelining, loop unrolling, renaming, memory disambiguation, copies, scheduling techniques |
17 | Berndt Bellay, Harald C. Gall |
A Comparison of Four Reverse Engineering Tools. |
WCRE |
1997 |
DBLP DOI BibTeX RDF |
reverse engineering tools, complex software systems analysis, maintenance activities, browsing capabilities, graphical reports, commercial reverse engineering tools, source code languages, C source code, Refine/C, Imagix4D, Sniff+, commercial embedded software system, embedded software systems, software engineers, reverse engineering, Rigi |
17 | Cecilia Metra, Michele Favalli, Bruno Riccò |
Highly testable and compact single output comparator. |
VTS |
1997 |
DBLP DOI BibTeX RDF |
comparators (circuits), single output comparator, self-checking n-input comparator, n-variable two-rail checker, equality checker, strongly code-disjoint, input code words, embedded comparators, VLSI, fault detection, totally-self-checking |
17 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
17 | Iiro S. Honkala, Yrjö Kaipainen, Aimo Tietäväinen |
Long binary narrow-sense BCH codes are normal. |
Appl. Algebra Eng. Commun. Comput. |
1996 |
DBLP DOI BibTeX RDF |
Finite fields, Code, Covering radius, BCH code, Character sum |
17 | Jens Knoop, Bernhard Steffen, Jürgen Vollmer 0001 |
Parallelism for Free: Efficient and Optimal Bitvector Analyses for Parallel Programs. |
ACM Trans. Program. Lang. Syst. |
1996 |
DBLP DOI BibTeX RDF |
assignment motion, bitvector problems, definition-use chains, partial dead-code elimination, parallelism, synchronization, shared memory, data flow analysis, program optimization, code motion, strength reduction, interleaving semantics |
17 | Stefan Fischer 0001, Jacek Wytrebowicz, Stanislaw Budkowski |
Hardware/Software Co-Design of Communication Protocols. |
EUROMICRO |
1996 |
DBLP DOI BibTeX RDF |
high performance distributed systems, system design techniques, standardized formal language Estelle, VHDL code, video-on-demand example, multimedia systems, multimedia systems, communication protocols, hardware/software codesign, C code |
17 | Jennifer Rexford, James W. Dolter, Wu-chang Feng, Kang G. Shin |
PP-MEss-SIM: a simulator for evaluating multicomputer interconnection networks. |
Annual Simulation Symposium |
1995 |
DBLP DOI BibTeX RDF |
PP-MEss-SIM, multicomputer interconnection network evaluation, object-oriented discrete-event simulation environment, communication workloads, routing-switching algorithms, router models, low-level device specification, code decoupling, independent code development, application workloads, object-oriented programming, virtual machines, multiprocessor interconnection networks, discrete event simulation, network topology, network topologies, network design, high-level architectures, network routing |
17 | Ryutaro Murakami, Yoshiteru Ohkura, Ryosaku Shimada |
2k-ary Cyclic AN Codes for Burst Error Correction. |
ISMVL |
1995 |
DBLP DOI BibTeX RDF |
2/sup k/-ary cyclic AN codes, burst error correction, radix 2/sup k/ expressions, code structure, arithmetic burst errors, burst error correction ability, binary cyclic AN code, error correction codes, error detection, error detection codes, arithmetic codes, arithmetic operations, cyclic codes |
17 | Michel Cosnard, Michel Loi |
Automatic task graph generation techniques. |
HICSS (2) |
1995 |
DBLP DOI BibTeX RDF |
automatic task graph generation techniques, parameterized task graph, problem-size-independent representation, directed acylic task graphs, annotated sequential program, node computational load, edge communication volume, local data structure generation, computation code generation, communication code generation, parallel programming, data structures, directed graphs, programming theory, automatic programming, parallel computation model |
17 | Mircea R. Stan, Wayne P. Burleson |
Coding a terminated bus for low power. |
Great Lakes Symposium on VLSI |
1995 |
DBLP DOI BibTeX RDF |
pull-up terminators, bus liner, limited-weight codes, parallel terminated buses, Rambus, perfect k/2-limited weight code, nonperfect 3-limited weight code, error correction codes, encoding, decoding, power dissipation, random-access storage, system buses |
17 | E. M. Osman, Grace Baratta-Perez, Thomas J. Walsh 0002, Kenneth J. Fowler |
A unique tool set for engineering complex systems. |
ICECCS |
1995 |
DBLP DOI BibTeX RDF |
tool set, life-cycle management, large-system features, Ada 83, C System Dependency Analyzers, Ada 83 Common Code Recognizer, Ada 83 Tasking Identifier, Rate Monotonic Analysis Scheduler, source code analysis tools, software engineering, reliability, software architecture, Ada, Ada, software maintenance, software tools, complex systems, portability, maintainability, software portability, software systems, porting |
17 | Hongxia Jin, Serdar Pehlivanoglu |
Traitor Tracing without A Priori Bound on the Coalition Size. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Christopher Ferguson, Qijun Gu, Hongchi Shi |
Self-healing control flow protection in sensor applications. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
sensor application, access control, self healing, tinyos, control flow |
17 | Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John McLean |
Applying Formal Methods to a Certifiably Secure Software System. |
IEEE Trans. Software Eng. |
2008 |
DBLP DOI BibTeX RDF |
security, verification, Formal methods, Specification, Software, tools, software verification, security kernels |
17 | Raffaele Mascella, Luca G. Tallini |
Efficient m-Ary Balanced Codes which Are Invariant under Symbol Permutation. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Coding and information theory, m{hbox{-}}rm ary communication, line codes, DC-free communication, delay-insensitive communication, error control codes, digital communication, constant weight codes, balanced codes |
17 | Jinghu Chen, R. Michael Tanner |
A Hybrid Coding Scheme for the Gilbert-Elliott Channel. |
IEEE Trans. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Joshua J. Bloch |
How to design a good API and why it matters. |
OOPSLA Companion |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Manuel Fähndrich, Michael Carbin, James R. Larus |
Reflective program generation with patterns. |
GPCE |
2006 |
DBLP DOI BibTeX RDF |
patterns, reflection, generative programming, templates |
17 | Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Darko Stefanovic |
Randomized instruction set emulation. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
Automated diversity, randomized instruction sets, software diversity |
17 | Guosen Yue, Xiaodong Wang 0001 |
Optimization of irregular repeat accumulate codes for MIMO systems with iterative receivers. |
IEEE Trans. Wirel. Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Michael W. Hicks, Scott Nettles |
Dynamic software updating. |
ACM Trans. Program. Lang. Syst. |
2005 |
DBLP DOI BibTeX RDF |
typed assembly language, Dynamic software updating |
17 | Mika Mäntylä |
An experiment on subjective evolvability evaluation of object-oriented software: explaining factors and interrater agreement. |
ISESE |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Steffen Tarnick |
Design of Embedded Self-Testing Checkers for t-UED and BUED Codes. |
J. Electron. Test. |
2004 |
DBLP DOI BibTeX RDF |
t-unidirectional error detecting (t-UED) codes, burst unidirectional error detecting (BUED) codes, averaging circuits, embedded checkers, self-testing checkers |
|
|