Sciweavers

1687 search results - page 34 / 338
» Which pointer analysis should I use
Sort
View
EMSOFT
2007
Springer
14 years 1 months ago
WCET estimation for executables in the presence of data caches
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation...
Rathijit Sen, Y. N. Srikant
PRDC
2009
IEEE
14 years 2 months ago
Evaluating the Use of Reference Run Models in Fault Injection Analysis
—Fault injection (FI) has been shown to be an effective approach to assessing the dependability of software systems. To determine the impact of faults injected during FI, a given...
Matthew Leeke, Arshad Jhumka
SPAA
2005
ACM
14 years 1 months ago
Fast construction of overlay networks
An asynchronous algorithm is described for rapidly constructing an overlay network in a peer-to-peer system where all nodes can in principle communicate with each other directly t...
Dana Angluin, James Aspnes, Jiang Chen, Yinghua Wu...
VISUALIZATION
2002
IEEE
14 years 19 days ago
PRIMA: A Case Study of Using Information Visualization Techniques for Patient Record Analysis
We have created an application, called PRIMA (Patient Record Intelligent Monitoring and Analysis), which can be used to visualize and understand patient record data. It was develo...
Donna L. Gresh, David A. Rabenhorst, Amnon Shabo, ...
SUTC
2010
IEEE
13 years 11 months ago
Data Caching in Ad Hoc Networks Using Game-Theoretic Analysis
— Extensive research has been performed to study selfish data caching in ad hoc networks using game-theoretic analysis. However, due to the caching problem’s theoretical root ...
Yutian Chen, Bin Tang