Sciweavers

166 search results - page 18 / 34
» Identifying State Transitions and their Functions in Source ...
Sort
View
WECWIS
2003
IEEE
106views ECommerce» more  WECWIS 2003»
14 years 23 days ago
Contract Representation for Run-time Monitoring and Enforcement
Converting a conventional contract into an electronic equivalent that can be executed and enforced by computers is a challenging task. The difficulties are caused by the ambiguiti...
Carlos Molina-Jiménez, Santosh K. Shrivasta...
ICSM
2006
IEEE
14 years 1 months ago
Working Session: Information Retrieval Based Approaches in Software Evolution
During software evolution a collection of related artifacts with different representations are created. Some of these are composed of structured data (e.g., analysis data), some c...
Andrian Marcus, Andrea De Lucia, Jane Huffman Haye...
CGO
2009
IEEE
14 years 2 months ago
OptiScope: Performance Accountability for Optimizing Compilers
Compilers employ many aggressive code transformations to achieve highly optimized code. However, because of complex target architectures and unpredictable optimization interaction...
Tipp Moseley, Dirk Grunwald, Ramesh Peri
FGCS
2006
113views more  FGCS 2006»
13 years 7 months ago
Performance feature identification by comparative trace analysis
This work introduces a method for instrumenting applications, producing execution traces, and visualizing multiple trace instances to identify performance features. The approach p...
Daniel P. Spooner, Darren J. Kerbyson
CN
1999
93views more  CN 1999»
13 years 7 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson