Sciweavers

1938 search results - page 115 / 388
» Dependable Software
Sort
View
120
Voted
PPOPP
2009
ACM
16 years 4 months ago
Committing conflicting transactions in an STM
Dependence-aware transactional memory (DATM) is a recently proposed model for increasing concurrency of memory transactions without complicating their interface. DATM manages depe...
Hany E. Ramadan, Indrajit Roy, Maurice Herlihy, Em...
141
Voted
ENTCS
2007
103views more  ENTCS 2007»
15 years 3 months ago
Static Slicing of Rewrite Systems
Program slicing is a method for decomposing programs by analyzing their data and control flow. Slicingbased techniques have many applications in the field of software engineerin...
Diego Cheda, Josep Silva, Germán Vidal
110
Voted
JCIT
2008
102views more  JCIT 2008»
15 years 3 months ago
Architectural Patterns for Finding your
The paper discusses the innovative patterns such as subtraction, multiplication, division, task unification and attribute dependency change for evaluating the software architectur...
N. Sankar Ram, Paul Rodrigues
142
Voted
SIGSOFT
1995
ACM
15 years 7 months ago
An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development
—We conducted a long-term experiment to compare the costs and benefits of several different software inspection methods. These methods were applied by professional developers to ...
Adam A. Porter, Harvey P. Siy, Carol A. Toman, Law...
139
Voted
ISLPED
1997
ACM
108views Hardware» more  ISLPED 1997»
15 years 7 months ago
Techniques for low energy software
The energy consumption of a system depends upon the hardware and software component of a system. Since it is the software which drives the hardware in most systems, decisions take...
Huzefa Mehta, Robert Michael Owens, Mary Jane Irwi...