Sciweavers

1299 search results - page 140 / 260
» On the Correctness of Operating System Kernels
Sort
View
CCR
2004
151views more  CCR 2004»
15 years 4 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
ISCA
2012
IEEE
281views Hardware» more  ISCA 2012»
13 years 7 months ago
LOT-ECC: Localized and tiered reliability mechanisms for commodity memory systems
Memory system reliability is a serious and growing concern in modern servers. Existing chipkill-level memory protection mechanisms suffer from several drawbacks. They activate a l...
Aniruddha N. Udipi, Naveen Muralimanohar, Rajeev B...
ISPAN
1997
IEEE
15 years 9 months ago
A New General Purpose Parallel Database System
This paper is concerned with the transparent parallelisation of declarative database queries, based on theoretical principles. We have designed an entire database architecture sui...
Mohamad Afshar, J. Bates, Gavin M. Bierman, K. Moo...
ICDE
2006
IEEE
193views Database» more  ICDE 2006»
16 years 6 months ago
Probabilistic Message Passing in Peer Data Management Systems
Until recently, most data integration techniques involved central components, e.g., global schemas, to enable transparent access to heterogeneous databases. Today, however, with t...
Philippe Cudré-Mauroux, Karl Aberer, Andras...
ISSTA
2000
ACM
15 years 9 months ago
Requirements-based monitors for real-time systems
—Before designing safety- or mission-critical real-time systems, a specification of the required behavior of the system should be produced and reviewed by domain experts. After ...
Dennis K. Peters, David Lorge Parnas