Sciweavers

1264 search results - page 224 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
ISSTA
2012
ACM
12 years 6 days ago
Residual investigation: predictive and precise bug detection
We introduce the concept of “residual investigation” for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that ...
Kaituo Li, Christoph Reichenbach, Christoph Csalln...
RTAS
2007
IEEE
14 years 4 months ago
An Approach for Real-Time Database Modeling and Performance Management
It is challenging to manage the performance of real-time databases (RTDBs) that are often used in data-intensive real-time applications such as agile manufacturing and target trac...
Jisu Oh, Kyoung-Don Kang
IMC
2006
ACM
14 years 3 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
CASES
2008
ACM
13 years 11 months ago
Cache-aware cross-profiling for java processors
Performance evaluation of embedded software is essential in an early development phase so as to ensure that the software will run on the embedded device's limited computing r...
Walter Binder, Alex Villazón, Martin Schoeb...
IWMM
2010
Springer
211views Hardware» more  IWMM 2010»
13 years 11 months ago
Concurrent, parallel, real-time garbage-collection
With the current developments in CPU implementations, it becomes obvious that ever more parallel multicore systems will be used even in embedded controllers that require real-time...
Fridtjof Siebert