Sciweavers

153 search results - page 27 / 31
» Checkbochs: Use Hardware to Check Software
Sort
View
103
Voted
ICSM
2005
IEEE
15 years 4 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
ICECCS
2010
IEEE
196views Hardware» more  ICECCS 2010»
14 years 11 months ago
Implementing and Evaluating a Model Checker for Transactional Memory Systems
Abstract—Transactional Memory (TM) is a promising technique that addresses the difficulty of parallel programming. Since TM takes responsibility for all concurrency control, TM ...
Woongki Baek, Nathan Grasso Bronson, Christos Kozy...
91
Voted
SEC
2004
15 years 7 days ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
CVHI
2007
15 years 9 days ago
A System for Control of Hearing Instrument Selection and Adjustment based on Evaluation of Correct Transmission of Speech Elemen
: Modern digital hearing aids provide unprecedented means of compensating for hearing impairments. However, this comes at the price of adjusting complex processing parameters. To a...
Axel Plinge, Dieter Bauer
98
Voted
SCP
1998
112views more  SCP 1998»
14 years 10 months ago
Structured Gamma
The Gamma language is based on the chemical reaction metaphor which has a number of benefits with respect to parallelism and program derivation. But the original definition of G...
Pascal Fradet, Daniel Le Métayer