Sciweavers

2512 search results - page 118 / 503
» Software Transactional Memory
Sort
View
IWPC
2005
IEEE
14 years 3 months ago
Detecting and Visualizing Refactorings from Software Archives
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Carsten Görg, Peter Weißgerber
OOPSLA
2005
Springer
14 years 3 months ago
An interactive visualization of refactorings retrieved from software archives
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Peter Weißgerber, Stephan Diehl, Carsten G&o...
FC
2000
Springer
83views Cryptology» more  FC 2000»
14 years 1 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
SIGSOFT
2005
ACM
14 years 11 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
ARCS
2006
Springer
14 years 2 months ago
Adding Low-Cost Hardware Barrier Support to Small Commodity Clusters
The performance of the barrier operation can be crucial for many parallel codes. Especially distributed shared memory systems have to synchronize frequently to ensure the proper o...
Torsten Hoefler, Torsten Mehlan, Frank Mietke, Wol...