Sciweavers

696 search results - page 6 / 140
» Isolated Program Execution: An Application Transparent Appro...
Sort
View
TACAS
2007
Springer
125views Algorithms» more  TACAS 2007»
14 years 1 months ago
Type-Dependence Analysis and Program Transformation for Symbolic Execution
Symbolic execution can be problematic when applied to real applications. This paper addresses two of these problems: (1) the constraints generated during symbolic execution may be ...
Saswat Anand, Alessandro Orso, Mary Jean Harrold
ICSM
2007
IEEE
14 years 1 months ago
SCARPE: A Technique and Tool for Selective Capture and Replay of Program Executions
Because of software’s increasing dynamism and the heterogeneity of execution environments, the results of in-house testing and maintenance are often not representative of the wa...
Shrinivas Joshi, Alessandro Orso
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
14 years 7 months ago
Middleware based Data Replication providing Snapshot Isolation
Many cluster based replication solutions have been proposed providing scalability and fault-tolerance. Many of these solutions perform replica control in a middleware on top of th...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
OOPSLA
2005
Springer
14 years 26 days ago
A delta-driven execution model for semantic computing
We describe (and demonstrate) the execution model of a computing platform where computation is both incremental and data-driven. We call such an approach delta-driven. The platfor...
Roly Perera, Jeff Foster, György Koch
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 9 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...