Sciweavers

360 search results - page 42 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
PLDI
2010
ACM
14 years 1 months ago
Adversarial memory for detecting destructive races
Multithreaded programs are notoriously prone to race conditions, a problem exacerbated by the widespread adoption of multi-core processors with complex memory models and cache coh...
Cormac Flanagan, Stephen N. Freund
AICCSA
2001
IEEE
131views Hardware» more  AICCSA 2001»
13 years 11 months ago
Constraint-Based Timetabling-A Case Study
This paper2 details the stages of building a substantial, carefully specified, fully tested and fully operational university and school timetabling system. This is reported as a c...
Abdulwahed M. Abbas, Edward P. K. Tsang
ISSTA
2000
ACM
14 years 9 days ago
Classification schemes to aid in the analysis of real-time systems
This paper presents three sets of classification schemes for processes, properties, and transitions that can be used to assist in the analysis of real-time systems. These classifi...
Paul Z. Kolano, Richard A. Kemmerer
SAC
2009
ACM
14 years 2 months ago
Where are your manners?: Sharing best community practices in the web 2.0
The Web 2.0 fosters the creation of communities by offering users a wide array of social software tools. While the success of these tools is based on their ability to support diff...
Angelo Di Iorio, Davide Rossi, Fabio Vitali, Stefa...
ECOOP
2006
Springer
13 years 11 months ago
Automatic Prefetching by Traversal Profiling in Object Persistence Architectures
Object persistence architectures support transparent access to persistent objects. For efficiency, many of these architectures support queries that can prefetch associated objects ...
Ali Ibrahim, William R. Cook