Results 21 to 30 of about 37,485,858 (384)

LULU Analysis Program

open access: yesIEEE Transactions on Nuclear Science, 1983
Our analysis program LULU has proven very useful in all stages of experiment analysis, from prerun detector debugging through final data reduction. It has solved our problem of having arbitrary word length events and is easy enough to use that many separate experimenters are now analyzing with LULU.
Crawford, H.J., Lindstrom, P.J.
openaire   +2 more sources

GDBMiner: Mining Precise Input Grammars on (Almost) Any System [PDF]

open access: yesLeibniz Transactions on Embedded Systems
If one knows the input language of the system to be tested, one can generate inputs in a very efficient manner. Grammar-based fuzzers, for instance, produce inputs that are syntactically valid by construction.
Eisele, Max   +3 more
doaj   +1 more source

PROGRAM PENGEMBANGAN AGROBISNIS HOLTIKULTURA DENGAN METODE POLICY ANALYSIS MATRIX [PDF]

open access: yes, 2009
Secara umum, tujuan evaluasi ini adalah untuk mengetahui sejauh mana keberhasilan program pengembangan agribisnis berbasis hortikultura yang telah dijalankan oleh Direktorat Jendral Bina Produksi Tanaman Hortikultura.
Budiman, Notoatmojo, Haryadi, Sarjono
core   +2 more sources

Adult education research between field and rhizome - a bibliometrical analysis of conference programs of ESREA

open access: yesEuropean Journal for Research on the Education and Learning of Adults, 2015
Adult education research is frequently an own subject of research. Such research is often focused on the analysis of journals. This paper will instead analyse triennial research conferences of the European Society for the Research on Adults (ESREA ...
Bernd Köpplinger
doaj   +1 more source

oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis [PDF]

open access: yesIEEE Transactions on Software Engineering, 2018
The Spectre vulnerability in modern processors has been widely reported. The key insight in this vulnerability is that speculative execution in processors can be misused to access the secrets.
Guanhua Wang   +4 more
semanticscholar   +1 more source

The Influence of Alias and References Escape on Java Program Analysis [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2015
The alias and references escape are often used in Java programs. They bring much convenience to the developers, but, at the same time, they also give adverse affects on the data flow and control flow of program during program analysis.
Shengbo Chen, Dashen Sun, Huaikou Miao
doaj   +1 more source

Re_Trans: Combined Retrieval and Transformer Model for Source Code Summarization

open access: yesEntropy, 2022
Source code summarization (SCS) is a natural language description of source code functionality. It can help developers understand programs and maintain software efficiently.
Chunyan Zhang   +5 more
doaj   +1 more source

Embedded Program Annotations for WCET Analysis [PDF]

open access: yes, 2018
We present __builtin_ais_annot(), a user-friendly, versatile way to transfer annotations (also known as flow facts) written on the source code level to the machine code level.
Cullmann, Christoph   +5 more
core   +3 more sources

Tree Inheritance Distance

open access: yesIEEE Access, 2020
Tree comparison is an important method in various areas. In order to compare class hierarchy in object-oriented languages, there is a need to compare trees in the context of the hierarchy changes.
Danijel Mlinaric   +2 more
doaj   +1 more source

Probabilistic Program Analysis

open access: yes, 2017
This paper provides a survey of recent work on adapting techniques for program analysis to compute probabilistic characterizations of program behavior. We survey how the frameworks of data flow analysis and symbolic execution have incorporated information about input probability distributions to quantify the likelihood of properties of program states ...
Dwyer, MB   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy