Sciweavers

1027 search results - page 76 / 206
» Callgraph properties of executables
Sort
View
113
Voted
VLDB
1990
ACM
166views Database» more  VLDB 1990»
15 years 4 months ago
The Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data
In this paper, we present an efficient algorithm for managing replicated data. We impose a logical tree structure on the set of copies of an object. In a failurefree environment t...
Divyakant Agrawal, Amr El Abbadi
90
Voted
ATVA
2008
Springer
89views Hardware» more  ATVA 2008»
15 years 2 months ago
Impartial Anticipation in Runtime-Verification
In this paper, a uniform approach for synthesizing monitors checking correctness properties specified in linear-time logics at runtime is provided. Therefore, a generic three-value...
Wei Dong, Martin Leucker, Christian Schallhart
FMOODS
2007
15 years 2 months ago
Distributed Applications Implemented in Maude with Parameterized Skeletons
Abstract. Algorithmic skeletons are a well-known approach for implementing parallel and distributed applications. Declarative versions typically use higher-order functions in funct...
Adrián Riesco, Alberto Verdejo
86
Voted
ISTA
2001
15 years 2 months ago
Application of Java-Technologies for Simulation in the Web
: In this article, the visual Internet-oriented Java-based E-net Simulation System (JESS) is considered. JESS supports all the simulation stages from constructing the models to exp...
Volodynur Kazymyr, Nataliya Demshevska
88
Voted
CN
1999
88views more  CN 1999»
15 years 14 days ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart