Sciweavers

696 search results - page 6 / 140
» Isolated Program Execution: An Application Transparent Appro...
Sort
View
TACAS
2007
Springer
125views Algorithms» more  TACAS 2007»
15 years 9 months ago
Type-Dependence Analysis and Program Transformation for Symbolic Execution
Symbolic execution can be problematic when applied to real applications. This paper addresses two of these problems: (1) the constraints generated during symbolic execution may be ...
Saswat Anand, Alessandro Orso, Mary Jean Harrold
ICSM
2007
IEEE
15 years 9 months ago
SCARPE: A Technique and Tool for Selective Capture and Replay of Program Executions
Because of software’s increasing dynamism and the heterogeneity of execution environments, the results of in-house testing and maintenance are often not representative of the wa...
Shrinivas Joshi, Alessandro Orso
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
16 years 3 months ago
Middleware based Data Replication providing Snapshot Isolation
Many cluster based replication solutions have been proposed providing scalability and fault-tolerance. Many of these solutions perform replica control in a middleware on top of th...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
OOPSLA
2005
Springer
15 years 8 months ago
A delta-driven execution model for semantic computing
We describe (and demonstrate) the execution model of a computing platform where computation is both incremental and data-driven. We call such an approach delta-driven. The platfor...
Roly Perera, Jeff Foster, György Koch
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 5 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...