159 views106 votes15 years 6 months ago ICSM 2005»
In order to support the maintenance of object-oriented software systems, the quality of their design must be evaluated using adequate quantiļ¬cation means. In spite of the curren...
In this paper, we will describe some heuristics that can be used to improve the runtime of a wide range of commonly used algorithms for the negative cycle detection problem signiļ¬...
248 views147 votes13 years 3 months ago ISCA 2012»
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
ā Many topology discovery systems rely on traceroute to discover path information in public networks. However, for some routers, traceroute detects their existence but not their ...
223 views109 votes15 years 4 months ago AINA 2007»
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Abstract. We propose a trace-based concurrent program analysis to soundly remove redundant synchronizations such as locks while preserving the behaviors of the concurrent computati...
158 views120 votes15 years 7 months ago IPPS 2008»
ā When an adaptive software component is employed to select the best-performing implementation for a communication operation at runtime, the correctness of the decision taken str...
Cross-core application interference due to contention for shared on-chip and off-chip resources pose a signiļ¬cant challenge to providing application level quality of service (Qo...
In this work, our objective is to heuristically discover a simpliļ¬ed form of functional dependencies between variables called weak dependencies. Once discovered, these relations...
In some cases, minimum Sum-Of-Products (SOP) expressions of Boolean functions can be derived by detecting decomposition and observing the functional properties such as unateness, ...