Sciweavers

2002 search results - page 390 / 401
» An Approach for Assessment of Reliability of the System Usin...
Sort
View
ICPP
2008
IEEE
14 years 2 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
RE
2007
Springer
14 years 1 months ago
Improving Performance Requirements Specifications from Field Failure Reports
Customer-reported field failures provide valuable information for the requirements of the next release. Without a systematic approach, the requirements of the next release may not...
Chih-Wei Ho, Laurie Williams, Annie I. Antó...
SETN
2004
Springer
14 years 29 days ago
Text Normalization for the Pronunciation of Non-standard Words in an Inflected Language
In this paper we present a novel approach, called “Text to Pronunciation (TtP)”, for the proper normalization of Non-Standard Words (NSWs) in unrestricted texts. The methodolog...
Gerasimos Xydas, Georgios Karberis, Georgios Kouro...
ASPLOS
2000
ACM
13 years 12 months ago
Power Aware Page Allocation
One of the major challenges of post-PC computing is the need to reduce energy consumption, thereby extending the lifetime of the batteries that power these mobile devices. Memory ...
Alvin R. Lebeck, Xiaobo Fan, Heng Zeng, Carla Schl...
DAC
2007
ACM
13 years 11 months ago
A Framework for the Validation of Processor Architecture Compliance
We present a framework for validating the compliance of a design with a given architecture. Our approach is centered on the concept of misinterpretations. These include missing be...
Allon Adir, Sigal Asaf, Laurent Fournier, Itai Jae...