Sciweavers

174 search results - page 22 / 35
» On Finding Duplication and Near-Duplication in Large Softwar...
Sort
View
OSDI
1996
ACM
13 years 8 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
CIDR
2007
173views Algorithms» more  CIDR 2007»
13 years 8 months ago
Database Servers on Chip Multiprocessors: Limitations and Opportunities
Prior research shows that database system performance is dominated by off-chip data stalls, resulting in a concerted effort to bring data into on-chip caches. At the same time, hi...
Nikos Hardavellas, Ippokratis Pandis, Ryan Johnson...
AIPS
2000
13 years 8 months ago
Plan Generation for GUI Testing
Graphical user interfaces (GUIs) have become nearly ubiquitous as a means of interacting with software systems. GUIs are typically highly complex pieces of software, and testing t...
Atif M. Memon, Martha E. Pollack, Mary Lou Soffa
ESEM
2008
ACM
13 years 9 months ago
Web application fault classification - an exploratory study
Controlled experiments in web application testing use seeded faults to evaluate the effectiveness of the testing technique. However, the classes of seeded faults are not always ex...
Yuepu Guo, Sreedevi Sampath