Sciweavers

153 search results - page 27 / 31
» Checkbochs: Use Hardware to Check Software
Sort
View
ICSM
2005
IEEE
14 years 1 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
ICECCS
2010
IEEE
196views Hardware» more  ICECCS 2010»
13 years 7 months ago
Implementing and Evaluating a Model Checker for Transactional Memory Systems
Abstract—Transactional Memory (TM) is a promising technique that addresses the difficulty of parallel programming. Since TM takes responsibility for all concurrency control, TM ...
Woongki Baek, Nathan Grasso Bronson, Christos Kozy...
SEC
2004
13 years 9 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
CVHI
2007
13 years 9 months ago
A System for Control of Hearing Instrument Selection and Adjustment based on Evaluation of Correct Transmission of Speech Elemen
: Modern digital hearing aids provide unprecedented means of compensating for hearing impairments. However, this comes at the price of adjusting complex processing parameters. To a...
Axel Plinge, Dieter Bauer
SCP
1998
112views more  SCP 1998»
13 years 7 months ago
Structured Gamma
The Gamma language is based on the chemical reaction metaphor which has a number of benefits with respect to parallelism and program derivation. But the original definition of G...
Pascal Fradet, Daniel Le Métayer