Sciweavers

365 search results - page 43 / 73
» Types for Safe Locking
Sort
View
SIGSOFT
2002
ACM
14 years 9 months ago
Using redundancies to find errors
This paper explores the idea that redundant operations, like type errors, commonly flag correctness errors. We experimentally test this idea by writing and applying four redundanc...
Yichen Xie, Dawson R. Engler
SIGMOD
2004
ACM
114views Database» more  SIGMOD 2004»
14 years 9 months ago
Evaluating lock-based protocols for cooperation on XML documents
We discuss four different core protocols for synchronizing access to and modifications of XML document collections. These core protocols synchronize structure traversals and modif...
Sven Helmer, Carl-Christian Kanne, Guido Moerkotte
CAISE
2009
Springer
14 years 3 months ago
Deriving Information Requirements from Responsibility Models
Abstract. This paper describes research in understanding the requirements for complex information systems that are constructed from one or more generic COTS systems. We argue that,...
Ian Sommerville, Russell Lock, Tim Storer, John Do...
EUROMICRO
2005
IEEE
14 years 2 months ago
QoSOnt: a QoS Ontology for Service-Centric Systems
This paper reports on the development of QoSOnt: an ontology for Quality of Service (QoS). Particular focus is given to its application in the field of service-centric systems. Qo...
Glen Dobson, Russell Lock, Ian Sommerville
ICFEM
2004
Springer
14 years 2 months ago
A General Model for Reachability Testing of Concurrent Programs
Reachability testing is a technique for testing concurrent programs. Reachability testing derives test sequences on-the-fly as the testing process progresses, and can be used to sy...
Richard H. Carver, Yu Lei