Version management is a pervasive issue in computer science. It is an important part of database theory, software engineering, distributed systems, etc. This paper focuses on version management for software being deve...
详细信息
Version management is a pervasive issue in computer science. It is an important part of database theory, software engineering, distributed systems, etc. This paper focuses on version management for software being developed in a software development environment or a software factory. The main objective of the paper is to present a new approach on version management Of reusable units of software by using modules/templates as the reusable units. This approach is adopted in the design of a software development environment called ROPCO. Reuse Of Persistent code and object code is an integrated collection of techniques, tools, and structures to facilitate the reusability of persistent code and object code.
The redundancy available in binary programs presents an opportunity for better utilization of limited memory resources in systems-on-a-chip by compressing the instruction memory. Class-based coding, a form of approxim...
详细信息
The redundancy available in binary programs presents an opportunity for better utilization of limited memory resources in systems-on-a-chip by compressing the instruction memory. Class-based coding, a form of approximate prefix coding, simplifies the code and thus is a suitable compression method for low-cost systems. We present a detailed frequency analysis of the SPEC2000 Alpha binary programs. Based on the results of this analysis, we introduce a new method for constructing classes. Then we apply this method and use it to compress the SPEC2000 Alpha binaries, and show that, in comparison with optimal prefix coding, the loss in compression efficiency is minimal. With some hardware support, the proposed method reduces the on-chip code by 43%. (C) 2003 Elsevier Science B.V. All rights reserved.
Embedded software must meet conflicting requirements such as being highly reliable, running on resource-con strained platforms, and being developed rapidly. Static program analysis can help meet all of these goals. Pe...
详细信息
ISBN:
(纸本)1581138040
Embedded software must meet conflicting requirements such as being highly reliable, running on resource-con strained platforms, and being developed rapidly. Static program analysis can help meet all of these goals. People developing analyzers for embedded object code face a difficult problem: writing an abstract version of each instruction in the target architecture(s). This is currently done by hand, resulting in abstract operations that are both buggy and imprecise. We have developed Hoist: a novel system that solves these problems by automatically constructing abstract operations using a microprocessor (or simulator) as its own specification. With almost no input from a human, Hoist generates a collection of C functions that are ready to be linked into an abstract interpreter. We demonstrate that Hoist generates abstract operations that are correct, having been extensively tested, sufficiently fast, and substantially more precise than manually written abstract operations. Hoist is currently limited to eight-bit machines due to costs exponential in the word size of the target architecture. It is essential to be able to analyze software running on these small processors: they are important and ubiquitous, with many embedded and safety-critical systems being based on them.
Modern software systems are becoming more and more complex thus demanding for new powerful development mechanisms. Model-driven engineering has been recognised as a promising paradigm for the development of complex sy...
详细信息
ISBN:
(纸本)9781479988280
Modern software systems are becoming more and more complex thus demanding for new powerful development mechanisms. Model-driven engineering has been recognised as a promising paradigm for the development of complex systems especially for its capability of abstracting the problem through models and then manipulating them to reach the implementation. In this work we provide a solution for the problem of automatically generating target code from models expressed in CHESS-ML, a UML profile that leverages the Action Language for Foundational UML. The goal is to produce code that does not require any manual intervention after its automatic generation to be executed on the target platform. Focus is on the generation of complex systems targeting both single and multi process deployment configurations as well as different execution platforms.
Static Analysis of CPU execution time using implicit path enumeration is an approach where translator predicts the execution time of a program. Basically translator is a System Software which converts computer languag...
详细信息
ISBN:
(纸本)9783642257339
Static Analysis of CPU execution time using implicit path enumeration is an approach where translator predicts the execution time of a program. Basically translator is a System Software which converts computer languages to machine understandable formats. Generally these translators will not estimate the CPU execution time of a given program, because execution time usually depends on execution environment like user inputs, system status, and system architecture and so on. This paper provides approach of to predict the CPU execution time of a given program during translation process.
Generally, when we optimize the object code of expression in source program, we get the optimizing code in the binary tree of this expression. Expressions in source program are in infix form, while the prefix form is ...
详细信息
ISBN:
(纸本)9783037851494
Generally, when we optimize the object code of expression in source program, we get the optimizing code in the binary tree of this expression. Expressions in source program are in infix form, while the prefix form is more efficient for the binary tree. Hence this paper is to provide an effective transition algorithm of arithmetic expression from infix form to prefix form.
This paper proposed a method and a prototype using static analysis to detect security of computer software. There are many buffer overflow vulnerabilities in released software. It uses the static object code analysis ...
详细信息
ISBN:
(纸本)9783037853122
This paper proposed a method and a prototype using static analysis to detect security of computer software. There are many buffer overflow vulnerabilities in released software. It uses the static object code analysis technology to detect buffer overflow, and analysis some unsafe function to determine whether the software has some default. It compares the different results of the proposed tool and traditional buffer overflow detecting tools, the false alarm rate is less than others, false negative rate is same as others.
暂无评论