In this paper, we propose an approach that provides the benefits of isolation in service-oriented applications where it is not feasible to use the traditional locking mechanisms u...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...
The guaranty of meeting the timing constraints during the design phase of real-time component-based embedded software has not been realized. To satisfy real-time requirements, we ...
Egor Bondarev, Peter H. N. de With, Michel R. V. C...
Defect density and defect prediction are essential for efficient resource allocation in software evolution. In an empirical study we applied data mining techniques for value seri...
The ongoing trend of increasing computer hardware and software complexity has resulted in the increase in complexity and overheads of cycle-accurate processor system simulation, e...
Seongbeom Kim, Fang Liu, Yan Solihin, Ravi R. Iyer...
Abstract. In this paper we give an overview of applications of Constraint Programming for IP (Internet Protocol) data networks, and discuss the problem of Resilience Analysis in mo...