Sciweavers

7124 search results - page 1340 / 1425
» Programming Languages and Operating Systems
Sort
View
ICSE
2005
IEEE-ACM
14 years 10 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski
ICSE
2008
IEEE-ACM
14 years 10 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICCD
2006
IEEE
115views Hardware» more  ICCD 2006»
14 years 7 months ago
Microarchitecture and Performance Analysis of Godson-2 SMT Processor
—This paper introduces the microarchitecture and logical implementation of SMT (Simultaneous Multithreading) improvement of Godson-2 processor which is a 64-bit, four-issue, out-...
Zusong Li, Xianchao Xu, Weiwu Hu, Zhimin Tang
ISEUD
2009
Springer
14 years 4 months ago
End-User Development of Enterprise Widgets
Companies are operating in a dynamic environment, resulting in a continuous need of adapting used information systems to changing business processes and associated information need...
Michael Spahn, Volker Wulf
ISSTA
2009
ACM
14 years 4 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
« Prev « First page 1340 / 1425 Last » Next »