Sciweavers

39 search results - page 2 / 8
» Exploiting Execution Context for the Detection of Anomalous ...
Sort
View
AADEBUG
1997
Springer
13 years 9 months ago
Modeling Intelligent System Execution as State Transition Diagrams to Support Debugging
Currently, few tools are available for assisting developers with debugging intelligent systems. Because these systems rely heavily on context dependent knowledge and sometimes sto...
Adele E. Howe, Gabriel Somlo
ASPLOS
2006
ACM
13 years 9 months ago
SlicK: slice-based locality exploitation for efficient redundant multithreading
Transient faults are expected a be a major design consideration in future microprocessors. Recent proposals for transient fault detection in processor cores have revolved around t...
Angshuman Parashar, Anand Sivasubramaniam, Sudhanv...
MICRO
1997
IEEE
127views Hardware» more  MICRO 1997»
13 years 9 months ago
Exploiting Dead Value Information
We describe Dead Value Information (DVI) and introduce three new optimizations which exploit it. DVI provides assertions that certain register values are dead, meaning they will n...
Milo M. K. Martin, Amir Roth, Charles N. Fischer
PLDI
2010
ACM
14 years 2 months ago
Breadcrumbs: Efficient Context Sensitivity for Dynamic Bug Detection Analyses
Calling context--the set of active methods on the stack--is critical for understanding the dynamic behavior of large programs. Dynamic program analysis tools, however, are almost ...
Michael D. Bond, Graham Z. Baker, Samuel Z. Guyer
PADS
1999
ACM
13 years 9 months ago
Exploiting Temporal Uncertainty in Parallel and Distributed Simulations
Most work to date in parallel and distributed discrete event simulation is based on assigning precise time stamps to events, and time stamp order event processing. An alternative ...
Richard Fujimoto