Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Using static analysis to detect memory access errors, such as null pointer dereferences, is not a new problem. However, much of the previous work has used rather sophisticated analysis techniques in order to detect such errors.
    • by  and +1
    •   4  
      Static AnalysisRandom access memoryStudent ProjectFalse Positive Rate
Most computer science educators hold strong opinions about the "right" approach to teaching introductory level programming. Unfortunately, we have comparatively little hard evidence about the effectiveness of these various approaches... more
    • by  and +1
    •   6  
      Computer Science EducationSoftware EvolutionStatistical SignificanceData Collection
We have replicated the experiments of Cecchet et al. detailed in "Performance and Scalability of EJB Applications" at OOPSLA '02. We report on our experiences configuring, deploying and tuning Enterprise software. We found a number of... more
    • by 
Much research has been done on techniques to teach students how to program. However, it is usually difficult to quantify exactly how students work. Instructors typically only see students' work when they submit their projects or come to... more
    • by  and +1
    •   2  
      Student LearningIntroductory Programming
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, access control, and other simple forms of behavioral... more
    • by 
    •   5  
      Static AnalysisAccess ControlPerformance ImprovementPeer to Peer
Two important questions regarding automated submission and testing systems are: What kind of feedback should we give students as they work on their programming assignments, and how can we study in more detail the programming assignment... more
    • by  and +1
    • Development Process
We evaluate the impact of programming language features on the performance of parallel applications on modern parallel architectures, particularly for the demanding case of sparse integer codes. We compare a number of programming... more
    • by  and +2
    •   5  
      Compiler OptimizationRemote AccessProgramming languageParallel Architecture
Various static analysis tools will analyze a software artifact in order to identify potential defects, such as misused APIs, race conditions and deadlocks, and security vulnerabilities. For a number of reasons, it is important to be able... more
    • by  and +1
    •   4  
      Static AnalysisJava ProgrammingMining Software RepositoriesSoftware Development Process
Atomic instructions atomically access and update one or more memory locations. Because they do not incur the overhead of lock acquisition or suspend the executing thread during contention, they may allow higher levels of concurrency on... more
    • by  and +1
    •   2  
      Data StructureJava Virtual Machine
We explore advances in Java Virtual Machine (JVM) technology along with new high performance I/O libraries in Java 1.4, and find that Java is increasingly an attractive platform for scientific clusterbased message passing codes. We report... more
    • by 
    •   4  
      New TechnologyMessage PassingHigh performanceJava Virtual Machine
    • by  and +1
    • Development Process
Testing is an important part of the software development cycle that should be covered throughout the computer science curriculum. However, for students to truly learn the value of testing, they need to benefit from writing test cases for... more
    • by 
    •   5  
      Computer Science EducationSoftware DevelopmentTest Driven DevelopmentComputer Science Curriculum
Valiant routing, the use of a random intermediate node to distribute network traffic, has been proposed for a number of recent HPC network topologies. It is also commonly used as a bulding block for adaptive routing algorithms, which use... more
    • by 
    •   8  
      Computer ScienceComputer NetworkParallel & Distributed ComputingNetwork Topology
    • by 
    • Computer Science Education
Cryptologia Publication details, including instructions for authors and subscription information: Abstract In 1967's The Broken Seal: The Story of ''Operation Magic'' and the Pearl Harbor Disaster, Ladislas Farago claimed that Herbert... more
    • by 
    •   2  
      CryptographyCryptology
The use of wireless telegraphy-radio-during World War I marked the advent of modern cryptology. For the first time, commanders were sending enciphered messages to front line troops and for the first time, the enemy had an enormous amount... more
    • by 
    • Political Science
What would happen if all of the algorithms in public-key cryptography suddenly could be broken in seconds or minutes? Those algorithms, like RSA and elliptic curve cryptography are the ones that we depend on for Internet commerce. What if... more
    • by 
    •   2  
      Computer ScienceHistory Computing
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the... more
    • by 
    • Computer Science
Industry trends showcase the increasing importance of soft skills, but interpersonal STEM education is not yet well defined [7, 14]. With high technology churn and increasingly higher-level programming practices, the need for effective... more
    • by 
Textbooks and courses on numerical algorithms contain numerous examples which lead students to believe that the algorithm of choice for computing the zeros of a function f(x) is Newton's algorithm. In many of these courses little or no... more
    • by 
    •   4  
      Computer ScienceAlgorithmBisection method Newton-Raphson‟s method