Sciweavers

153 search results - page 27 / 31
» Checkbochs: Use Hardware to Check Software
Sort
View
ICSM
2005
IEEE
15 years 6 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
ICECCS
2010
IEEE
196views Hardware» more  ICECCS 2010»
15 years 18 days ago
Implementing and Evaluating a Model Checker for Transactional Memory Systems
Abstract—Transactional Memory (TM) is a promising technique that addresses the difficulty of parallel programming. Since TM takes responsibility for all concurrency control, TM ...
Woongki Baek, Nathan Grasso Bronson, Christos Kozy...
SEC
2004
15 years 1 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
94
Voted
CVHI
2007
15 years 1 months ago
A System for Control of Hearing Instrument Selection and Adjustment based on Evaluation of Correct Transmission of Speech Elemen
: Modern digital hearing aids provide unprecedented means of compensating for hearing impairments. However, this comes at the price of adjusting complex processing parameters. To a...
Axel Plinge, Dieter Bauer
SCP
1998
112views more  SCP 1998»
15 years 2 days ago
Structured Gamma
The Gamma language is based on the chemical reaction metaphor which has a number of benefits with respect to parallelism and program derivation. But the original definition of G...
Pascal Fradet, Daniel Le Métayer