Sciweavers

1406 search results - page 147 / 282
» Software trace cache
Sort
View
SIGSOFT
2007
ACM
16 years 3 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
BILDMED
2007
15 years 3 months ago
Semi-automatic Segmentation of the Patellar Cartilage in MRI
A software system for semi-automatic segmentation of the patellar cartilage is introduced. Providing tools for sub-pixel accurate edge tracing, automatic contour completion, and ad...
Lorenz König, Martin Groher, Andreas Keil, Ch...
122
Voted
ISCA
2000
IEEE
121views Hardware» more  ISCA 2000»
15 years 6 months ago
Selective, accurate, and timely self-invalidation using last-touch prediction
Communication in cache-coherent distributed shared memory (DSM) often requires invalidating (or writing back) cached copies of a memory block, incurring high overheads. This paper...
An-Chow Lai, Babak Falsafi
SIGSOFT
2007
ACM
16 years 3 months ago
Recovering and using use-case-diagram-to-source-code traceability links
Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining ...
Mark Grechanik, Kathryn S. McKinley, Dewayne E. Pe...
134
Voted
ISCA
1994
IEEE
129views Hardware» more  ISCA 1994»
15 years 6 months ago
Software Versus Hardware Shared-Memory Implementation: A Case Study
We comparethe performance of software-supported shared memory on a general-purpose network to hardware-supported shared memory on a dedicated interconnect. Up to eight processors,...
Alan L. Cox, Sandhya Dwarkadas, Peter J. Keleher, ...