Sciweavers

1040 search results - page 13 / 208
» Resource Usage Verification
Sort
View
DEBS
2010
ACM
13 years 11 months ago
Workload characterization for operator-based distributed stream processing applications
Operator-based programming languages provide an effective development model for large scale stream processing applications. A stream processing application consists of many runtim...
Xiaolan J. Zhang, Sujay Parekh, Bugra Gedik, Henri...
TCAD
2008
103views more  TCAD 2008»
13 years 8 months ago
Using Transfer-Resource Graph for Software-Based Verification of System-on-Chip
The verification of a system-on-chip is challenging due to its high level of integration. Multiple components in a system can behave concurrently and compete for resources. Hence, ...
Xiaoxi Xu, Cheng-Chew Lim
SIGSOFT
2007
ACM
14 years 9 months ago
Mining API patterns as partial orders from source code: from usage scenarios to specifications
A software system interacts with third-party libraries through various APIs. Using these library APIs often needs to follow certain usage patterns. Furthermore, ordering rules (sp...
Mithun Acharya, Tao Xie, Jian Pei, Jun Xu
PAMI
2007
150views more  PAMI 2007»
13 years 8 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...
RTAS
2008
IEEE
14 years 2 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...