Sciweavers

2111 search results - page 100 / 423
» How to Program Pervasive Systems
Sort
View
101
Voted
ESOP
2010
Springer
15 years 10 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker
CONCURRENCY
2007
100views more  CONCURRENCY 2007»
15 years 19 days ago
An instrumentation technique for online analysis of multithreaded programs
Runtime verification of multithreaded systems, that is, the process of finding errors in multithreaded systems as they execute, is the theme of this paper. The major goal of the...
Grigore Rosu, Koushik Sen
UIST
2000
ACM
15 years 5 months ago
A programming model for active documents
Traditionally, designers organize software system as active end-points (e.g. applications) linked by passive infrastructures (e.g. networks). Increasingly, however, networks and i...
Paul Dourish, W. Keith Edwards, Jon Howell, Anthon...
107
Voted
IEEEARES
2010
IEEE
15 years 2 months ago
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
—One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore t...
Jorge Blasco Alís, Agustín Orfila, A...
124
Voted
ECRTS
2002
IEEE
15 years 5 months ago
Scope-Tree: A Program Representation for Symbolic Worst-Case Execution Time Analysis
Most WCET analysis techniques only provide an upper bound on the worst case execution time as a constant value. However, it often appears that the execution time of a piece of cod...
Antoine Colin, Guillem Bernat