Sciweavers

4196 search results - page 623 / 840
» Supporting the development of network programs
Sort
View
188
Voted
ASPLOS
2011
ACM
14 years 7 months ago
RCDC: a relaxed consistency deterministic computer
Providing deterministic execution significantly simplifies the debugging, testing, replication, and deployment of multithreaded programs. Recent work has developed deterministic...
Joseph Devietti, Jacob Nelson, Tom Bergan, Luis Ce...
ICSE
2008
IEEE-ACM
16 years 4 months ago
Predicting accurate and actionable static analysis warnings: an experimental approach
Static analysis tools report software defects that may or may not be detected by other verification methods. Two challenges complicating the adoption of these tools are spurious f...
Joseph R. Ruthruff, John Penix, J. David Morgentha...
242
Voted
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 4 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
ICFP
2004
ACM
16 years 3 months ago
Slideshow: functional presentations
Among slide-presentation systems, the dominant application offers lly no abstraction capability. Slideshow, an extension of PLT Scheme, represents our effort over the last several...
Robert Bruce Findler, Matthew Flatt
ISW
2007
Springer
15 years 10 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...