Sciweavers

617 search results - page 51 / 124
» Debugging distributed programs using controlled re-execution
Sort
View
CCR
2004
151views more  CCR 2004»
13 years 10 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
MSR
2006
ACM
14 years 4 months ago
Using evolutionary annotations from change logs to enhance program comprehension
Evolutionary annotations are descriptions of how source code evolves over time. Typical source comments, given their static nature, are usually inadequate for describing how a pro...
Daniel M. Germán, Peter C. Rigby, Margaret-...
GECCO
2007
Springer
151views Optimization» more  GECCO 2007»
14 years 5 months ago
Solving real-valued optimisation problems using cartesian genetic programming
Classical Evolutionary Programming (CEP) and Fast Evolutionary Programming (FEP) have been applied to realvalued function optimisation. Both of these techniques directly evolve th...
James Alfred Walker, Julian Francis Miller
POPL
2000
ACM
14 years 3 months ago
Type Systems for Distributed Data Structures
Distributed-memory programs are often written using a global address space: any process can name any memory location on any processor. Some languages completely hide the distincti...
Ben Liblit, Alexander Aiken
ICDAR
2003
IEEE
14 years 4 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...