Sciweavers

5109 search results - page 828 / 1022
» On Learning Limiting Programs
Sort
View
AICCSA
2008
IEEE
266views Hardware» more  AICCSA 2008»
15 years 11 months ago
A novel flow-sensitive type and effect analysis for securing C code
In this paper, we present a novel type and effect analysis for detecting type cast errors and memory errors in C source code. Our approach involves a type system with effect, regi...
Syrine Tlili, Mourad Debbabi
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
15 years 11 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
ICSM
2008
IEEE
15 years 11 months ago
Quota-constrained test-case prioritization for regression testing of service-centric systems
Test-case prioritization is a typical scenario of regression testing, which plays an important role in software maintenance. With the popularity of Web Services, integrating Web S...
Shan-Shan Hou, Lu Zhang, Tao Xie, Jiasu Sun
128
Voted
IEEEPACT
2008
IEEE
15 years 11 months ago
The PARSEC benchmark suite: characterization and architectural implications
This paper presents and characterizes the Princeton Application Repository for Shared-Memory Computers (PARSEC), a benchmark suite for studies of Chip-Multiprocessors (CMPs). Prev...
Christian Bienia, Sanjeev Kumar, Jaswinder Pal Sin...
IEEEPACT
2008
IEEE
15 years 11 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...