Sciweavers

1406 search results - page 147 / 282
» Software trace cache
Sort
View
SIGSOFT
2007
ACM
14 years 11 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
BILDMED
2007
13 years 11 months ago
Semi-automatic Segmentation of the Patellar Cartilage in MRI
A software system for semi-automatic segmentation of the patellar cartilage is introduced. Providing tools for sub-pixel accurate edge tracing, automatic contour completion, and ad...
Lorenz König, Martin Groher, Andreas Keil, Ch...
ISCA
2000
IEEE
121views Hardware» more  ISCA 2000»
14 years 2 months ago
Selective, accurate, and timely self-invalidation using last-touch prediction
Communication in cache-coherent distributed shared memory (DSM) often requires invalidating (or writing back) cached copies of a memory block, incurring high overheads. This paper...
An-Chow Lai, Babak Falsafi
SIGSOFT
2007
ACM
14 years 11 months ago
Recovering and using use-case-diagram-to-source-code traceability links
Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining ...
Mark Grechanik, Kathryn S. McKinley, Dewayne E. Pe...
ISCA
1994
IEEE
129views Hardware» more  ISCA 1994»
14 years 2 months ago
Software Versus Hardware Shared-Memory Implementation: A Case Study
We comparethe performance of software-supported shared memory on a general-purpose network to hardware-supported shared memory on a dedicated interconnect. Up to eight processors,...
Alan L. Cox, Sandhya Dwarkadas, Peter J. Keleher, ...