Sciweavers

2913 search results - page 413 / 583
» How Much to Copy
Sort
View
FM
1999
Springer
111views Formal Methods» more  FM 1999»
14 years 1 months ago
Developing BON as an Industrial-Strength Formal Method
Abstract. The emerging Unified Modelling Language has been touted as merging the best features of existing modelling languages, and has been adopted by leading companies and vendo...
Richard F. Paige, Jonathan S. Ostroff
CSFW
1998
IEEE
14 years 1 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
ICLP
1999
Springer
14 years 1 months ago
Concurrency in Prolog Using Threads and a Shared Database
Concurrency in Logic Programming has received much attention in the past. One problem with many proposals, when applied to Prolog, is that they involve large modifications to the...
Manuel Carro, Manuel V. Hermenegildo
ICS
1999
Tsinghua U.
14 years 1 months ago
Application scaling under shared virtual memory on a cluster of SMPs
In this paper we examine how application performance scales on a state-of-the-art shared virtual memory (SVM) system on a cluster with 64 processors, comprising 4-way SMPs connect...
Dongming Jiang, Brian O'Kelley, Xiang Yu, Sanjeev ...
ISCA
1998
IEEE
143views Hardware» more  ISCA 1998»
14 years 1 months ago
Lockup-Free Instruction Fetch/Prefetch Cache Organization
In the past decade. there has been much literature describing various cache organizatrons that exploit general programming idiosyncrasies to obtain maxrmum hit rate (the probabili...
David Kroft