Sciweavers

27 search results - page 2 / 6
» Techniques for Validation and Controlled Execution of Proces...
Sort
View
TSE
1998
93views more  TSE 1998»
13 years 5 months ago
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
An important step in the development of dependable systems is the validation of their fault tolerance properties. Fault injection has been widely used for this purpose, however wi...
Joao Carreira, Henrique Madeira, João Gabri...
JSA
2000
175views more  JSA 2000»
13 years 6 months ago
Complete worst-case execution time analysis of straight-line hard real-time programs
In this article, the problem of finding a tight estimate on the worst-case execution time (WCET) of a real-time program is addressed. The analysis is focused on straight-line code...
Friedhelm Stappert, Peter Altenbernd
EDBT
2006
ACM
143views Database» more  EDBT 2006»
14 years 6 months ago
XG: A Grid-Enabled Query Processing Engine
In [12] we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. In this demo we show how this architecture is le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Thom...
VLDB
2007
ACM
77views Database» more  VLDB 2007»
14 years 8 days ago
Tracing Lineage Beyond Relational Operators
Tracing the lineage of data is an important requirement for establishing the quality and validity of data. Recently, the problem of data provenance has been increasingly addressed...
Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Pr...
NDSS
2005
IEEE
13 years 11 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...