Sciweavers

332 search results - page 45 / 67
» Invasive Patterns for Distributed Programs
Sort
View
ICSE
2009
IEEE-ACM
16 years 2 months ago
Discovering and representing systematic code changes
Software engineers often inspect program differences when reviewing others' code changes, when writing check-in comments, or when determining why a program behaves differentl...
Miryung Kim, David Notkin
ICDCS
2009
IEEE
15 years 11 months ago
FlashLite: A User-Level Library to Enhance Durability of SSD for P2P File Sharing
Peer-to-peer file sharing is popular, but it generates random write traffic to storage due to the nature of swarming. NAND flash memory based Solid-State Drive (SSD) technology...
Hyojun Kim, Umakishore Ramachandran
EUROPAR
2007
Springer
15 years 8 months ago
Fine Tuning Algorithmic Skeletons
Abstract. Algorithmic skeletons correspond to a high-level programming model that takes advantage of nestable programming patterns to hide the complexity of parallel/distributed ap...
Denis Caromel, Mario Leyton
109
Voted
LCPC
2007
Springer
15 years 8 months ago
Communicating Multiprocessor-Tasks
The use of multiprocessor tasks (M-tasks) has been shown to be successful for mixed task and data parallel implementations of algorithms from scientific computing. The approach o...
Jörg Dümmler, Thomas Rauber, Gudula R&uu...
ISSTA
2012
ACM
13 years 4 months ago
Residual investigation: predictive and precise bug detection
We introduce the concept of “residual investigation” for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that ...
Kaituo Li, Christoph Reichenbach, Christoph Csalln...