Sciweavers

323 search results - page 18 / 65
» Verify Your Runs
Sort
View
FSKD
2005
Springer
120views Fuzzy Logic» more  FSKD 2005»
14 years 28 days ago
Impact on the Writing Granularity for Incremental Checkpointing
Incremental checkpointing is an cost-efficient fault tolerant technique for long running programs such as genetic algorithms. In this paper, we derive the equations for the writing...
Junyoung Heo, Xuefeng Piao, Sangho Yi, Geunyoung P...
PPPJ
2009
ACM
14 years 2 months ago
Phase detection using trace compilation
Dynamic compilers can optimize application code specifically for observed code behavior. Such behavior does not have to be stable across the entire program execution to be bene...
Christian Wimmer, Marcelo Silva Cintra, Michael Be...
MSS
1999
IEEE
118views Hardware» more  MSS 1999»
13 years 11 months ago
Designing a Self-Maintaining Storage System
This paper shows the suitability of a "self-maintaining" approach to Tertiary Disk, a large-scale disk array system built from commodity components. Instead of incurring...
Satoshi Asami, Nisha Talagala, David A. Patterson
SIMUTOOLS
2008
13 years 9 months ago
Snoopy: a tool to design and animate/simulate graph-based formalisms
We sketch the fundamental properties and features of Snoopy, a tool to model and execute (animate, simulate) hierarchical graph-based system descriptions. The tool comes along wit...
Monika Heiner, Ronny Richter, Martin Schwarick
CSFW
2002
IEEE
14 years 13 days ago
Strand Spaces and Rank Functions: More than Distant Cousins
The strand spaces model and the rank functions model have both been used successfully to analyse and verify security protocols running on unbounded networks. At first sight, thes...
James Heather