Sciweavers

1683 search results - page 208 / 337
» Testing system virtual machines
Sort
View
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 11 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
FMICS
2009
Springer
15 years 11 months ago
A Rigorous Methodology for Composing Services
on Abstraction: a Lightweight Approach to Modelling Concurrency. Javier de Dios and Ricardo Peña Certified Implementation on top of the Java Virtual Machine 19:00 Social dinner + ...
Kenneth J. Turner, Koon Leai Larry Tan
USENIX
2008
15 years 7 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
ASPLOS
2004
ACM
15 years 10 months ago
HOIST: a system for automatically deriving static analyzers for embedded systems
Embedded software must meet conflicting requirements such as being highly reliable, running on resource-constrained platforms, and being developed rapidly. Static program analysi...
John Regehr, Alastair Reid
KES
2008
Springer
15 years 4 months ago
Reinforcing fuzzy rule-based diagnosis of turbomachines with case-based reasoning
This paper presents an integrated knowledge-based system, which combines fuzzy rule-based reasoning with case-based reasoning, for turbomachinery diagnosis. By incorporating a case...
Meijun Yang, Qiang Shen