Sciweavers

4280 search results - page 761 / 856
» Mechanisms for information elicitation
Sort
View
ESOP
2001
Springer
14 years 2 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
INAP
2001
Springer
14 years 2 months ago
iML: A Logic-based Framework for Constructing Graphical User Interface on Mobile Agents
Mobile agent technology is an emerging technology that allows easier design, implementation, and maintenance of distributed systems. Mobility enables agents to reduce network load,...
Naoki Fukuta, Nobuaki Mizutani, Tadachika Ozono, T...
ICNP
2000
IEEE
14 years 2 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
ASPLOS
2000
ACM
14 years 2 months ago
Symbiotic Jobscheduling for a Simultaneous Multithreading Processor
Simultaneous Multithreading machines fetch and execute instructions from multiple instruction streams to increase system utilization and speedup the execution of jobs. When there ...
Allan Snavely, Dean M. Tullsen
NPIV
1999
ACM
142views Visualization» more  NPIV 1999»
14 years 2 months ago
ALMOST: Exploring Program Traces
We built a tool to visualize and explore program execution traces. Our goal was to help programmers without any prior knowledge of a program, quickly get enough knowledge about it...
Manos Reniers, Steven P. Reis