Sciweavers

2520 search results - page 287 / 504
» Model-checking behavioral programs
Sort
View
ICCD
2008
IEEE
370views Hardware» more  ICCD 2008»
15 years 11 months ago
Simulation points for SPEC CPU 2006
— Increasing sizes of benchmarks make detailed simulation an extremely time consuming process. Statistical techniques such as the SimPoint methodology have been proposed in order...
Arun A. Nair, Lizy K. John
108
Voted
ICCD
2006
IEEE
115views Hardware» more  ICCD 2006»
15 years 11 months ago
Long-term Performance Bottleneck Analysis and Prediction
— Identifying performance bottlenecks is important for microarchitects and application developers to produce high performance microprocessor designs and application software. Man...
Fei Gao, Suleyman Sair
85
Voted
IWPC
2008
IEEE
15 years 9 months ago
Exploiting Runtime Information in the IDE
Developers rely on the mechanisms provided by their IDE to browse and navigate a large software system. These mechanisms are usually based purely on a system’s static source cod...
David Röthlisberger, Orla Greevy, Oscar Niers...
117
Voted
SP
2007
IEEE
15 years 9 months ago
Using Rescue Points to Navigate Software Recovery
We present a new technique that enables software recovery in legacy applications by retrofitting exception-handling capabilities, error virtualization using rescue points. We int...
Stelios Sidiroglou, Oren Laadan, Angelos D. Keromy...
97
Voted
DSN
2005
IEEE
15 years 8 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...