Sciweavers

1045 search results - page 185 / 209
» The Use of Exceptions
Sort
View
CAV
1998
Springer
175views Hardware» more  CAV 1998»
14 years 7 days ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
IDMS
1998
Springer
107views Multimedia» more  IDMS 1998»
14 years 6 days ago
Classifying Objectionable Websites Based on Image Content
This paper describes IBCOW Image-based Classi cation of Objectionable Websites, a system capable of classifying a website as objectionable or benign based on image content. The sys...
James Ze Wang, Jia Li, Gio Wiederhold, Oscar Firsc...
IWMM
1998
Springer
130views Hardware» more  IWMM 1998»
14 years 6 days ago
Comparing Mostly-Copying and Mark-Sweep Conservative Collection
Many high-level language compilers generate C code and then invoke a C compiler for code generation. To date, most of these compilers link the resulting code against a conservativ...
Frederick Smith, J. Gregory Morrisett
CCGRID
2009
IEEE
13 years 12 months ago
Failure-Aware Construction and Reconfiguration of Distributed Virtual Machines for High Availability Computing
In large-scale clusters and computational grids, component failures become norms instead of exceptions. Failure occurrence as well as its impact on system performance and operatio...
Song Fu
POPL
2000
ACM
13 years 11 months ago
Modular Refinement of Hierarchic Reactive Machines
with existing analysis tools. Modular reasoning principles such as abstraction, compositional refinement, and assume-guarantee reasoning are well understood for architectural hiera...
Rajeev Alur, Radu Grosu