نتایج جستجو برای: lines of code

تعداد نتایج: 21183134  

2009
Virgilio Borges Marco Tulio Valente

This paper details an algorithm that automatically annotates blocks of code associated to variabilities in software product lines. The proposed algorithm is based on a tool to implement variabilities called CIDE (Colored IDE). CIDE enhances standard IDE with the ability to associate colors to lines of code in charge of implementing variabilities. Furthermore, the tool supports the generation of...

1997
Margo I. Seltzer Yasuhiro Endo Christopher Small Keith A. Smith

Operating systems research has traditionally consisted of adding functionality to the operating system or inventing and evaluating new methods for performing functions. Regardless of the research goal, the single constant has been that the size and complexity of operating systems increase over time. As a result, operating systems are usually the single most complex piece of software in a comput...

Journal: :Computational Statistics & Data Analysis 2008
B. D. McCullough

Microsoft attempted to implement theWichmann–Hill RNG in Excel 2003 and failed; it did not just produce numbers between zero andunity, itwould also produce negative numbers. Microsoft issued a patch that allegedly fixed the problem so that the patched Excel 2003 and Excel 2007 now implement the Wichmann–Hill RNG, as least according to Microsoft. We show thatwhatever RNG it is thatMicrosoft has ...

2012
Charles Roberts Graham Wakefield Matthew Wright

Designing mobile interfaces for computer-based musical performance is generally a time-consuming task that can be exasperating for performers. Instead of being able to experiment freely with physical interfaces’ affordances, performers must spend time and attention on non-musical tasks including network configuration, development environments for the mobile devices, defining OSC address spaces,...

2004
Hao Chen Drew Dean David A. Wagner

Implementation bugs in security-critical software are pervasive. Several authors have previously suggested model checking as a promising means to detect improper use of system interfaces and thereby detect a broad class of security vulnerabilities. In this paper, we report on our practical experience using MOPS, a tool for software model checking security-critical applications. As examples of s...

Journal: :CoRR 2006
Joy Mukherjee Srinidhi Varadarajan

We recommend a programming construct – availability check – for programs that need to automatically adjust to presence or absence of segments of code. The idea is to check the existence of a valid definition before a function call is invoked. The syntax is that of a simple ‘if’ statement. The vision is to enable customization of application functionality through addition or removal of optional ...

2002
Bruno Blanchet Patrick Cousot Radhia Cousot Jérôme Feret Laurent Mauborgne Antoine Miné David Monniaux Xavier Rival

We report on a successful preliminary experience in the design and implementation of a special-purpose Abstract Interpretation based static program analyzer for the verification of safety critical embedded real-time software. The analyzer is both precise (zero false alarm in the considered experiment) and efficient (less than one minute of analysis for 10,000 lines of code). Even if it is based...

2004
S. Alexander Spoon Olin Shivers

After two decades of effort, type inference for dynamically typed languages scales to programs of a few tens of thousands of lines of code, but no further. For larger programs, this paper proposes using a kind of demand-driven analysis where the number of active goals is carefully restricted. To achieve this restriction, the algorithm occasionally prunes goals by giving them solutions that are ...

2002
Pasi Alatalo Jarkko Järvenoja Jari T. Karvonen Ari Keronen Pasi Kuvaja

Modern computer architectures are large containing thousands of lines of code with complex and often distributed forms. Mobile and multi-platform solutions even increase this complexity. Modeling and managing a software architecture is important way of handling these complex systems, describing it to different actors inside software business and for analyzing and improving system performance. I...

Journal: :Computers & Mathematics with Applications 2017
Matthew W. Scroggs Timo Betcke Erik Burman Wojciech Smigaj Elwin van't Wout

In recent years there have been tremendous advances in the theoretical understanding of boundary integral equations for Maxwell problems. In particular, stable dual pairings of discretisation spaces have been developed that allow robust formulations of the preconditioned electric field, magnetic field and combined field integral equations. Within the BEM++ boundary element library we have devel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید