Sciweavers

1080 search results - page 41 / 216
» Improving Software Inspections by Using Reading Techniques
Sort
View
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
14 years 1 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
CODES
2001
IEEE
15 years 1 months ago
Empirical comparison of software-based error detection and correction techniques for embedded systems
"Function Tokens" and "NOP Fills" are two methods proposed by various authors to deal with Instruction Pointer corruption in microcontrollers, especially in th...
Royan H. L. Ong, Michael J. Pont
HPDC
1995
IEEE
15 years 1 months ago
Disk-Directed I/O for an Out-of-Core Computation
New file systems are critical to obtain good I/O performance on large multiprocessors. Several researchers have suggested the use of collective file-system operations, in which ...
David Kotz
60
Voted
PODC
2009
ACM
15 years 10 months ago
Max registers, counters, and monotone circuits
A method is given for constructing a max register, a linearizable, wait-free concurrent data structure that supports a write operation and a read operation that returns the larges...
James Aspnes, Hagit Attiya, Keren Censor
ECLIPSE
2006
ACM
15 years 3 months ago
XPlainer-Eclipse: explaining XPath within Eclipse
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specificatio...
John W. S. Liu, Mariano P. Consens, Flavio Rizzolo