Sciweavers

1629 search results - page 265 / 326
» Infeasible Code Detection
Sort
View
ICSE
2007
IEEE-ACM
14 years 10 months ago
Predicting Faults from Cached History
We analyze the version history of 7 software systems to predict the most fault prone entities and files. The basic assumption is that faults do not occur in isolation, but rather ...
Sunghun Kim, Thomas Zimmermann, E. James Whitehead...
POPL
2010
ACM
14 years 7 months ago
A simple, verified validator for software pipelining
Software pipelining is a loop optimization that overlaps the execution of several iterations of a loop to expose more instruction-level parallelism. It can result in first-class p...
Jean-Baptiste Tristan, Xavier Leroy
PPOPP
2010
ACM
14 years 7 months ago
Leveraging parallel nesting in transactional memory
Exploiting the emerging reality of affordable multi-core architeces through providing programmers with simple abstractions that would enable them to easily turn their sequential p...
João Barreto, Aleksandar Dragojevic, Paulo ...
SOSP
2007
ACM
14 years 7 months ago
Improving file system reliability with I/O shepherding
We introduce a new reliability infrastructure for file systems called I/O shepherding. I/O shepherding allows a file system developer to craft nuanced reliability policies to de...
Haryadi S. Gunawi, Vijayan Prabhakaran, Swetha Kri...
ASIAMS
2009
IEEE
14 years 5 months ago
CSI Feedback Model in the Context of Adaptive Cognitive Radio Systems
Cognitive radio has the ability to sense the environment and adapt its behavior to optimize communication features, such as quality of service in the presence of interference and ...
Haleh Hosseini, Anis Izzati Ahmad Zamani, Sharifah...