Sciweavers

5790 search results - page 862 / 1158
» Distributed programming with distributed authorization
Sort
View
139
Voted
ASPDAC
2011
ACM
217views Hardware» more  ASPDAC 2011»
14 years 6 months ago
Realization and performance comparison of sequential and weak memory consistency models in network-on-chip based multi-core syst
This paper studies realization and performance comparison of the sequential and weak consistency models in the network-on-chip (NoC) based distributed shared memory (DSM) multi-cor...
Abdul Naeem, Xiaowen Chen, Zhonghai Lu, Axel Jants...
125
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Symbolic mining of temporal specifications
Program specifications are important in many phases of the software development process, but they are often omitted or incomplete. An important class of specifications takes the f...
Mark Gabel, Zhendong Su
138
Voted
WWW
2004
ACM
16 years 3 months ago
An agent system reasoning about the web and the user
The paper describes some innovations related to the ongoing work on the GSA prototype, an integrated information retrieval agent. In order to improve the original system effective...
Giovambattista Ianni, Francesco Ricca, Francesco C...
ASPLOS
2009
ACM
16 years 3 months ago
ASSURE: automatic software self-healing using rescue points
Software failures in server applications are a significant problem for preserving system availability. We present ASSURE, a system that introduces rescue points that recover softw...
Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nic...
137
Voted
KDD
2007
ACM
151views Data Mining» more  KDD 2007»
16 years 3 months ago
Efficient mining of iterative patterns for software specification discovery
Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggrava...
Chao Liu 0001, David Lo, Siau-Cheng Khoo