Sciweavers

3667 search results - page 162 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
USENIX
1993
13 years 11 months ago
Measurement, Analysis, and Improvement of UDP/IP Throughput for the DECstation 5000
Networking software is a growing bottleneck in modern workstations, particularly for high throughput applications such as networked digital video. We measure various components of...
Jonathan Kay, Joseph Pasquale
RE
2008
Springer
13 years 9 months ago
"Fairness Analysis" in Requirements Assignments
Requirements engineering for multiple customers, each of whom have competing and often conflicting priorities, raises issues of negotiation, mediation and conflict resolution. Thi...
Anthony Finkelstein, Mark Harman, S. Afshin Mansou...
APAL
2011
13 years 5 months ago
The Suslin operator in applicative theories: Its proof-theoretic analysis via ordinal theories
The Suslin operator E1 is a type-2 functional testing for the wellfoundedness of binary relations on the natural numbers. In the context of applicative theories, its proof-theoret...
Gerhard Jäger, Dieter Probst
TCBB
2011
13 years 5 months ago
Probabilistic Analysis of Probe Reliability in Differential Gene Expression Studies with Short Oligonucleotide Arrays
— Probe defects are a major source of noise in gene expression studies. While existing approaches detect noisy probes based on external information such as genomic alignments, we...
Leo Lahti, Laura Elo, Tero Aittokallio, Samuel Kas...
SIGSOFT
2003
ACM
14 years 11 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler