Sciweavers

264 search results - page 46 / 53
» Source-Based Trace Exploration
Sort
View
CAV
2010
Springer
225views Hardware» more  CAV 2010»
15 years 1 months ago
Merit: An Interpolating Model-Checker
Abstract. We present the tool MERIT, a CEGAR model-checker for safety propf counter-systems, which sits in the Lazy Abstraction with Interpolants (LAWI) framework. LAWI is parametr...
Nicolas Caniart
IM
2007
14 years 11 months ago
Compass: Cost of Migration-aware Placement in Storage Systems
— We investigate methodologies for placement and migration of logical data stores in virtualized storage systems leading to optimum system configuration in a dynamic workload sc...
Akshat Verma, Upendra Sharma, Rohit Jain, Koustuv ...
71
Voted
IJVR
2006
116views more  IJVR 2006»
14 years 9 months ago
New Directions in 3D User Interfaces
Three-dimensional user interfaces (3D UIs) support user tasks in many non-traditional interactive systems such as virtual environments, augmented reality, and ubiquitous computing...
Doug A. Bowman, Jian Chen, Chadwick A. Wingrave, J...
CTW
2007
121views more  CTW 2007»
14 years 9 months ago
Regularly irregular: how groups reconcile cross-cutting agendas and demand in healthcare
Abstract The flow of technical work in acute healthcare varies unpredictably, in patterns that occur regularly enough that they can be managed. Acute care organizations develop wa...
Christopher P. Nemeth, Mark Nunnally, Michael F. O...
PPOPP
2009
ACM
15 years 10 months ago
Formal verification of practical MPI programs
This paper considers the problem of formal verification of MPI programs operating under a fixed test harness for safety properties without building verification models. In our app...
Anh Vo, Sarvani S. Vakkalanka, Michael Delisi, Gan...