Sciweavers

1528 search results - page 170 / 306
» Performance Assertion Checking
Sort
View
236
Voted
POPL
2003
ACM
16 years 2 months ago
From symptom to cause: localizing errors in counterexample traces
There is significant room for improving users' experiences with model checking tools. An error trace produced by a model checker can be lengthy and is indicative of a symptom...
Thomas Ball, Mayur Naik, Sriram K. Rajamani
ICDE
2010
IEEE
539views Database» more  ICDE 2010»
16 years 2 months ago
Impact of Disk Corruption on Open-Source DBMS
Abstract-- Despite the best intentions of disk and RAID manufacturers, on-disk data can still become corrupted. In this paper, we examine the effects of corruption on database mana...
Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan...
137
Voted
PLDI
2009
ACM
15 years 9 months ago
Analyzing recursive programs using a fixed-point calculus
We show that recursive programs where variables range over finite domains can be effectively and efficiently analyzed by describing the analysis algorithm using a formula in a ...
Salvatore La Torre, Parthasarathy Madhusudan, Genn...
108
Voted
CF
2004
ACM
15 years 8 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
NETGAMES
2003
ACM
15 years 7 months ago
Bandwidth requirement and state consistency in three multiplayer game architectures
Abstract— Multiplayer games become increasingly popular, mostly because they involve interaction among humans. Typically, multiplayer games are organized based on a Client-Server...
Joseph D. Pellegrino, Constantinos Dovrolis