Sciweavers

323 search results - page 47 / 65
» Verify Your Runs
Sort
View
DAGSTUHL
2003
13 years 11 months ago
Pattern Synthesis from Multiple Scenarios for Parameterized Real-Time UML Models
Abstract. The continuing trend towards more sophisticated technical applications results in an increasing demand for high quality software for complex, safety-critical systems. Des...
Holger Giese, Florian Klein, Sven Burmester
WSC
2000
13 years 11 months ago
Facilitating level three cache studies using set sampling
We discuss some of the difficulties present in trace collection and trace-driven cache simulation. We then describe our multiprocessor tracing technique and verify that it accurat...
Niki C. Thornock, J. Kelly Flanagan
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
13 years 11 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 10 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
CSDA
2008
128views more  CSDA 2008»
13 years 10 months ago
On the equivalence between Non-negative Matrix Factorization and Probabilistic Latent Semantic Indexing
Non-negative Matrix Factorization (NMF) and Probabilistic Latent Semantic Indexing (PLSI) have been successfully applied to document clustering recently. In this paper, we show th...
Chris H. Q. Ding, Tao Li, Wei Peng