Sciweavers

191 search results - page 12 / 39
» Comparing Program Phase Detection Techniques
Sort
View
ICPP
2008
IEEE
14 years 2 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
ICSM
2005
IEEE
14 years 1 months ago
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications
Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases must accu...
Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lor...
ICSE
2011
IEEE-ACM
12 years 11 months ago
MeCC: memory comparison-based clone detector
In this paper, we propose a new semantic clone detection e by comparing programs’ abstract memory states, which are computed by a semantic-based static analyzer. Our experimenta...
Heejung Kim, Yungbum Jung, Sunghun Kim, Kwangkeun ...
FASE
2009
Springer
14 years 2 months ago
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis
Abstract. The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Atomicity violation, which is ...
Qichang Chen, Liqiang Wang, Zijiang Yang, Scott D....
IJAIT
2008
99views more  IJAIT 2008»
13 years 7 months ago
Optimal Basic Block Instruction Scheduling for Multiple-Issue Processors Using Constraint Programming
Instruction scheduling is one of the most important steps for improving the performance of object code produced by a compiler. A fundamental problem that arises in instruction sch...
Abid M. Malik, Jim McInnes, Peter van Beek