Sciweavers

1615 search results - page 36 / 323
» Distributed Forward Checking
Sort
View
CONCUR
2001
Springer
14 years 6 days ago
Bounded Reachability Checking with Process Semantics
Bounded model checking has been recently introduced as an efficient verification method for reactive systems. In this work we apply bounded model checking to asynchronous systems....
Keijo Heljanko
IPPS
2003
IEEE
14 years 29 days ago
Model Checking a Cache Coherence Protocol for a Java DSM Implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java’s memory model and allows multithreaded Java progr...
Jun Pang, Wan Fokkink, Rutger F. H. Hofman, Ronald...
PLDI
1990
ACM
13 years 11 months ago
A Fresh Look at Optimizing Array Bound Checking
- This paper describes techniques for optimizing range checks performed to detect array bound violations. In addition to the elimination of range check:s, the optimizations discuss...
Rajiv Gupta
IADIS
2003
13 years 9 months ago
Ad Hoc Interface Evolution in Soap
Modern distributed systems often allow independent development of their components. Successful evolution of such systems depends on the flexibility of component interfaces. This p...
Nikita Schmidt, Ahmed Patel, Mikhail Sogrine
ACSAC
2009
IEEE
13 years 11 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning