Sciweavers

1679 search results - page 229 / 336
» Strong order equivalence
Sort
View
ASPLOS
2010
ACM
14 years 5 days ago
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...
PPOPP
2009
ACM
14 years 9 months ago
Formal verification of practical MPI programs
This paper considers the problem of formal verification of MPI programs operating under a fixed test harness for safety properties without building verification models. In our app...
Anh Vo, Sarvani S. Vakkalanka, Michael Delisi, Gan...
CDC
2009
IEEE
151views Control Systems» more  CDC 2009»
14 years 1 months ago
A poset framework to model decentralized control problems
— In this paper we use partially ordered sets (posets) to study decentralized control problems arising in different settings. We show that time delayed systems with certain dela...
Parikshit Shah, Pablo A. Parrilo
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
14 years 10 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
14 years 9 months ago
Detecting and resolving unsound workflow views for correct provenance analysis
views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is careful...
Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen