Sciweavers

3801 search results - page 190 / 761
» An Approach to Modeling Software Safety
Sort
View
PATMOS
2004
Springer
15 years 10 months ago
Run-Time Software Monitor of the Power Consumption of Wireless Network Interface Cards
Abstract. In this paper we present a new approach to power modeling and runtime power estimation for wireless network interface cards (WNICs). We obtain run-time power estimates by...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
KBSE
2009
IEEE
15 years 11 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
ICECCS
2006
IEEE
90views Hardware» more  ICECCS 2006»
15 years 10 months ago
A Type System for the Relational Calculus of Object Systems
Being a successful technique in software practice, Object Orientation (OO) is a hot topic in academic research fields. Among many formalisms, rCOS, a refinement calculus of obje...
Liang Zhao, Xiangpeng Zhao, Quan Long, Zongyan Qiu
ESEC
1999
Springer
15 years 9 months ago
Data-Flow Analysis of Program Fragments
Traditional interprocedural data-flow analysis is performed on whole programs; however, such whole-program analysis is not feasible for large or incomplete programs. We propose fr...
Atanas Rountev, Barbara G. Ryder, William Landi
ESEC
1997
Springer
15 years 8 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...