Sciweavers

3311 search results - page 259 / 663
» Deductive Object Programming
Sort
View
110
Voted
SIGMETRICS
1992
ACM
128views Hardware» more  SIGMETRICS 1992»
15 years 6 months ago
MemSpy: Analyzing Memory System Bottlenecks in Programs
To cope with the increasing difference between processor and main memory speeds, modern computer systems use deep memory hierarchies. In the presence of such hierarchies, the perf...
Margaret Martonosi, Anoop Gupta, Thomas E. Anderso...
125
Voted
ASPLOS
2006
ACM
15 years 8 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
135
Voted
SIGPLAN
2002
15 years 2 months ago
Write barrier removal by static analysis
We present a new analysis for removing unnecessary write barriers in programs that use generational garbage collection. To our knowledge, this is the first static program analysis...
Karen Zee, Martin C. Rinard
WORDS
2002
IEEE
15 years 7 months ago
Meta-Programming Techniques for Distributed Real-time and Embedded Systems
Commercial off-the-shelf (COTS) middleware increasingly offers not only functional support for standard interfaces, but also the ability to optimize their resource consumption pat...
Joseph K. Cross, Douglas C. Schmidt
130
Voted
WSC
2000
15 years 3 months ago
Using simulation to evaluate cargo ship design on the LPD17 program
As part of the design of the next generation Naval Amphibious Transport Dock Ship (LPD17), simulation was used to evaluate the arrangement and flow of cargo on the ship and to int...
Joseph Hugan