Sciweavers

4722 search results - page 505 / 945
» Encoding Program Executions
Sort
View
184
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Using Chemical Metaphor to Express Workflow and Service Orchestration
Abstract--Nowadays, novel applications, such as personalized e-commerce services, call for cooperation across enterprise boundaries. Service-Oriented-Architecture (SOA) forms a sol...
Chen Wang, Jean-Louis Pazat
VLSISP
2011
231views Database» more  VLSISP 2011»
14 years 12 months ago
Loop Distribution and Fusion with Timing and Code Size Optimization
Loop distribution and loop fusion are two effective loop transformation techniques to optimize the execution of the programs in DSP applications. In this paper, we propose a new t...
Meilin Liu, Edwin Hsing-Mean Sha, Qingfeng Zhuge, ...
CAV
2012
Springer
334views Hardware» more  CAV 2012»
13 years 7 months ago
Joogie: Infeasible Code Detection for Java
We present Joogie, a tool that detects infeasible code in Java programs. Infeasible code is code that does not occur on feasible controlflow paths and thus has no feasible executi...
Stephan Arlt, Martin Schäf
ISSTA
2009
ACM
15 years 11 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore
166
Voted
EAGC
2004
Springer
15 years 10 months ago
Monitoring Message-Passing Parallel Applications in the Grid with GRM and Mercury Monitor
Application monitoring in the grid for parallel applications is hardly supported in recent grid infrastructures. There is a need to visualize the behavior of the program during its...
Norbert Podhorszki, Zoltán Balaton, Gabor G...