Sciweavers

3555 search results - page 573 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
235
Voted
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 3 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
121
Voted
TPDS
2010
155views more  TPDS 2010»
15 years 2 months ago
Streamline: An Optimal Distribution Algorithm for Peer-to-Peer Real-Time Streaming
—In this paper we propose and evaluate an overlay distribution algorithm for P2P, chunk-based, streaming systems over forest-based topologies. In such systems, the stream is divi...
Giuseppe Bianchi, Nicola Blefari-Melazzi, Lorenzo ...
144
Voted
TECS
2008
119views more  TECS 2008»
15 years 3 months ago
Fast exploration of bus-based communication architectures at the CCATB abstraction
straction SUDEEP PASRICHA and NIKIL DUTT University of California, Irvine and MOHAMED BEN-ROMDHANE Newport Media Inc. Currently, system-on-chip (SoC) designs are becoming increasin...
Sudeep Pasricha, Nikil Dutt, Mohamed Ben-Romdhane
110
Voted
CHI
2009
ACM
16 years 4 months ago
Supporting the design of network-spanning applications
In this case study, we describe our use of ECT, a tool intended to simplify the design and development of network-spanning applications. We have used ECT throughout the course of ...
Stefan Rennick Egglestone, Andy Boucher, Tom Rodde...
144
Voted
IWPC
2000
IEEE
15 years 8 months ago
The Effect of Call Graph Construction Algorithms for Object-Oriented Programs on Automatic Clustering
Call graphs are commonly used as input for automatic clustering algorithms, the goal of which is to extract the high level structure of the program under study. Determining the ca...
Derek Rayside, Steve Reuss, Erik Hedges, Kostas Ko...