Sciweavers

2947 search results - page 57 / 590
» Analyzing Program Analyses
Sort
View
PPOPP
2010
ACM
15 years 24 days ago
Analyzing lock contention in multithreaded applications
Many programs exploit shared-memory parallelism using multithreading. Threaded codes typically use locks to coordinate access to shared data. In many cases, contention for locks r...
Nathan R. Tallent, John M. Mellor-Crummey, Allan P...
ASPLOS
2012
ACM
13 years 10 months ago
Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults
Future microprocessors need low-cost solutions for reliable operation in the presence of failure-prone devices. A promising approach is to detect hardware faults by deploying low-...
Siva Kumar Sastry Hari, Sarita V. Adve, Helia Naei...
ICSE
2003
IEEE-ACM
16 years 2 months ago
Fragment Class Analysis for Testing of Polymorphism in Java Software
Testing of polymorphism in object-oriented software may require coverage of all possible bindings of receiver classes and target methods at call sites. Tools that measure this cove...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
126
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
NAR
2008
125views more  NAR 2008»
15 years 2 months ago
Phylogeny.fr: robust phylogenetic analysis for the non-specialist
Phylogenetic analyses are central to many research areas in biology and typically involve the identification of homologous sequences, their multiple alignment, the phylogenetic re...
Alexis Dereeper, V. Guignon, G. Blanc, Stép...