Sciweavers

6960 search results - page 336 / 1392
» Continuity Analysis of Programs
Sort
View
EMSOFT
2009
Springer
15 years 11 months ago
Probabilistic modeling of data cache behavior
In this paper, we propose a formal analysis approach to estimate the expected (average) data cache access time of an application across all possible program inputs. Towards this g...
Vinayak Puranik, Tulika Mitra, Y. N. Srikant
SAS
1999
Springer
15 years 8 months ago
Eliminating Dead Code on Recursive Data
This paper describes a powerful method for dead code analysis and elimination in the presence of recursive data constructions. We describe partially dead recursive data using live...
Yanhong A. Liu, Scott D. Stoller
SIGADA
1998
Springer
15 years 8 months ago
Looking into Safety with the Safety and Security Rapporteur Group
The requirements of High Integrity safety-critical, secure and mission-critical Software force developers to use specialised development techniques. Often the choice of computer l...
Stephen Michell, Mark Saaltink, Brian A. Wichmann
WABI
2005
Springer
120views Bioinformatics» more  WABI 2005»
15 years 10 months ago
A Compressed Format for Collections of Phylogenetic Trees and Improved Consensus Performance
Phylogenetic tree searching algorithms often produce thousands of trees which biologists save in Newick format in order to perform further analysis. Unfortunately, Newick is neithe...
Robert S. Boyer, Warren A. Hunt Jr., Serita M. Nel...
AMEC
2004
Springer
15 years 10 months ago
An Evolutionary Game-Theoretic Comparison of Two Double-Auction Market Designs
In this paper we describe an analysis of two double auction markets— the clearing house auction and the continuous double auction. The complexity of these institutions is such th...
Steve Phelps, Simon Parsons, Peter McBurney