Sciweavers

2068 search results - page 125 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
ICSE
2009
IEEE-ACM
15 years 11 months ago
Automated substring hole analysis
Code coverage is a common measure for quantitatively assessing the quality of software testing. Code coverage indicates the fraction of code that is actually executed by tests in ...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
ESOP
2006
Springer
15 years 8 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
CGO
2011
IEEE
14 years 8 months ago
Phase-based tuning for better utilization of performance-asymmetric multicore processors
—The latest trend towards performance asymmetry among cores on a single chip of a multicore processor is posing new challenges. For effective utilization of these performanceasym...
Tyler Sondag, Hridesh Rajan
ISCA
2012
IEEE
281views Hardware» more  ISCA 2012»
13 years 7 months ago
LOT-ECC: Localized and tiered reliability mechanisms for commodity memory systems
Memory system reliability is a serious and growing concern in modern servers. Existing chipkill-level memory protection mechanisms suffer from several drawbacks. They activate a l...
Aniruddha N. Udipi, Naveen Muralimanohar, Rajeev B...
SIGSOFT
2008
ACM
16 years 5 months ago
Doloto: code splitting for network-bound web 2.0 applications
Modern Web 2.0 applications, such as GMail, Live Maps, Facebook and many others, use a combination of Dynamic HTML, JavaScript and other Web browser technologies commonly referred...
V. Benjamin Livshits, Emre Kiciman