Sciweavers

9316 search results - page 1710 / 1864
» Analysis of traceback techniques
Sort
View
SIGGRAPH
1993
ACM
15 years 8 months ago
Surround-screen projection-based virtual reality: the design and implementation of the CAVE
Several common systems satisfy some but not all of the VR definition above. Flight simulators provide vehicle tracking, not head tracking, and do not generally operate in binocular...
Carolina Cruz-Neira, Daniel J. Sandin, Thomas A. D...
AMOST
2007
ACM
15 years 8 months ago
Achieving both model and code coverage with automated gray-box testing
We have devised a novel technique to automatically generate test cases for a software system, combining black-box model-based testing with white-box parameterized unit testing. Th...
Nicolas Kicillof, Wolfgang Grieskamp, Nikolai Till...
CGO
2009
IEEE
15 years 8 months ago
Communication-Sensitive Static Dataflow for Parallel Message Passing Applications
Message passing is a very popular style of parallel programming, used in a wide variety of applications and supported by many APIs, such as BSD sockets, MPI and PVM. Its importance...
Greg Bronevetsky
EMSOFT
2007
Springer
15 years 8 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
ISSTA
2010
ACM
15 years 8 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
« Prev « First page 1710 / 1864 Last » Next »