Sciweavers

1687 search results - page 36 / 338
» Which pointer analysis should I use
Sort
View
CODAS
2001
100views more  CODAS 2001»
13 years 9 months ago
Set-Based Access Conflicts Analysis of Concurrent Workflow Definition
An error-comprising workflow dejinition might provoke serious problems to an enterprise especially when it is involved with mission critical business processes. Concurrency of wor...
Minkyu Lee, Dongsoo Han, Jaeyong Shim
FTRTFT
1998
Springer
13 years 12 months ago
On the Need for Practical Formal Methods
A controversial issue in the formal methods community is the degree to which mathematical sophistication and theorem proving skills should be needed to apply a formal method. A fun...
Constance L. Heitmeyer
CCR
2008
84views more  CCR 2008»
13 years 7 months ago
Modeling internet topology dynamics
Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. Whi...
Hamed Haddadi, Steve Uhlig, Andrew W. Moore, Richa...
ASPLOS
2008
ACM
13 years 9 months ago
The mapping collector: virtual memory support for generational, parallel, and concurrent compaction
Parallel and concurrent garbage collectors are increasingly employed by managed runtime environments (MREs) to maintain scalability, as multi-core architectures and multi-threaded...
Michal Wegiel, Chandra Krintz
SAC
2005
ACM
14 years 1 months ago
Time-varying, multivariate volume data reduction
Large-scale supercomputing is revolutionizing the way science is conducted. A growing challenge, however, is understanding the massive quantities of data produced by largescale si...
Nathaniel Fout, Kwan-Liu Ma, James P. Ahrens