Sciweavers

2421 search results - page 325 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ESOP
2000
Springer
15 years 8 months ago
Compile-Time Debugging of C Programs Working on Trees
We exhibit a technique for automatically verifying the safety of simple C programs working on tree-shaped data structures. We do not consider the complete behavior of programs, but...
Jacob Elgaard, Anders Møller, Michael I. Sc...
HPDC
2007
IEEE
15 years 11 months ago
Feedback-directed thread scheduling with memory considerations
This paper describes a novel approach to generate an optimized schedule to run threads on distributed shared memory (DSM) systems. The approach relies upon a binary instrumentatio...
Fengguang Song, Shirley Moore, Jack Dongarra
IWPSE
2007
IEEE
15 years 11 months ago
Modification analysis support at the requirements level
Modification analysis is part of most maintenance processes and includes among other activities, early prediction of potential change impacts, feasibility studies, cost estimation...
Maryam Shiri, Jameleddine Hassine, Juergen Rilling
RTSS
2000
IEEE
15 years 9 months ago
Enhanced Fixed-Priority Scheduling with (m, k)-Firm Guarantee
In this paper, we study the problem of scheduling task sets with (m,k) constraints. In our approach, jobs of each task are partitioned into two sets: mandatory and optional. Manda...
Gang Quan, Xiaobo Sharon Hu
AH
2006
Springer
15 years 8 months ago
A Comparative Study of Compound Critique Generation in Conversational Recommender Systems
Abstract. Critiquing techniques provide an easy way for users to feedback their preferences over one or several attributes of the products in a conversational recommender system. W...
Jiyong Zhang, Pearl Pu