Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Safe Coding
biblio
Resilient Reorder Buffer Design for Network-on-Chip
Submitted by grigby1 on Fri, 03/27/2020 - 10:27am
Reorder Buffer
Network interfaces
network-on-chip
Network-on-Chip Advanced eXtensible Interface Network Interface block
parallel processing
policy-based governance
pubcrawl
random control logic
Registers
Metrics
resilience
Resiliency
resilient Reorder buffer design
Safe Coding
safe control logic design
safe ROB design
Safety
Table lookup
fault tolerance
buffer circuits
collaboration
control logic function
Diagnostic Coverage requirement
error correction codes
error detection
error detection code
error detection codes
area efficient safe design techniques
Fault tolerant systems
high performance computing systems
Human behavior
Human Factors
Industries
integrated circuit design
invariance checking
logic design
biblio
Research and Analysis of User Behavior Fingerprint on Security Situational Awareness Based on DNS Log
Submitted by grigby1 on Mon, 02/17/2020 - 4:17pm
Big Data
composability
DNS
fingerprint
Metrics
pubcrawl
resilience
Resiliency
Safe Coding
situational awareness
User behavior
biblio
Cross-Release Code Churn Impact on Effort-Aware Software Defect Prediction
Submitted by grigby1 on Thu, 09/26/2019 - 9:25am
open-source projects
standards
software quality
software metrics
software defect prediction
Safe Coding
Resiliency
resilience
regression analysis
public domain software
pubcrawl
Predictive models
Pop effort aware measure
policy-based governance
AUC
Open Source Software
Metrics
Measurement
Human Factors
Human behavior
GM
effort-aware software defect prediction
design metrics
cross-release code churn impact
Cross-release code churn
Correlation
complex systems
collaboration
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 9:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools
biblio
Checked C: Making C Safe by Extension
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
incremental conversion
tools
storage management
static analysis
spatial safety
security
Safety
Safe Coding
Resiliency
resilience
pubcrawl
programming languages
program debugging
policy-based governance
performance evaluation
Metrics
backward-compatibility
Human Factors
Human behavior
highly performant code
developer control
Cyclones
Computer bugs
collaboration
checked region
checked pointer
checked C's design
C++ language
C safe
bounds-safe interfaces
Benchmark testing
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
biblio
Safe Automated Refactoring for Intelligent Parallelization of Java 8 Streams
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
semantics-preserving fashion
policy-based governance
pubcrawl
Refactoring
resilience
Resiliency
running operations
safe automated refactoring
Safe Coding
Semantics
Pipelines
sequential streams
software maintenance
static analysis
Stream API
stream code
stream operations
streams
typestate analysis
Writing
Instruction sets
automated refactoring approach
automatic parallelization
collaboration
data structures
finite data structures
Human behavior
Human Factors
Image color analysis
infinite data structures
application program interfaces
intelligent parallelization
Java
Java 8
lambda expression side-effects
mainstream object-oriented programming languages
MapReduce-style operations
Metrics
optimizing stream code
parallel streams
biblio
CapeVM: A Safe and Fast Virtual Machine for Resource-Constrained Internet-of-Things Devices
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
ahead-of-time compilers
collaboration
fault isolation
Human behavior
Human Factors
Metrics
Performance
policy-based governance
pubcrawl
resilience
Resiliency
Safe Coding
Safety
sandbox
sensor nodes
virtual machines
biblio
Towards Safe Refactoring for Intelligent Parallelization of Java 8 Streams
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
collaboration
Human behavior
Human Factors
Java 8
Metrics
parallelization
policy-based governance
pubcrawl
Refactoring
resilience
Resiliency
Safe Coding
streams
typestate analysis
biblio
Safe Stream-Based Programming with Refinement Types
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
collaboration
Human behavior
Human Factors
Metrics
Mobile Applications
policy-based governance
pubcrawl
refinement types
resilience
Resiliency
Safe Coding
stream-based programming
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »