Sciweavers

1541 search results - page 219 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
124
Voted
PLDI
2010
ACM
15 years 5 months ago
Adversarial memory for detecting destructive races
Multithreaded programs are notoriously prone to race conditions, a problem exacerbated by the widespread adoption of multi-core processors with complex memory models and cache coh...
Cormac Flanagan, Stephen N. Freund
103
Voted
APCHI
1998
IEEE
15 years 4 months ago
Claymore: Augmented Direct Manipulation of Three-Dimensional Objects
This paper describes a method for manipulating a threedimensional object without considering conventional three independent orthogonal views. We apply the direct manipulation to o...
Hideki Mitsunobu, Takashi Oshiba, Jiro Tanaka
DSRT
2008
IEEE
15 years 2 months ago
Evaluating Large Scale Distributed Simulation of P2P Networks
P2P systems have witnessed phenomenal development in recent years. Evaluating and analyzing new and existing algorithms and techniques is a key issue for developers of P2P systems...
Tien Tuan Anh Dinh, Georgios K. Theodoropoulos, Ro...
SCESM
2006
ACM
239views Algorithms» more  SCESM 2006»
15 years 6 months ago
Aspect-oriented software design with a variant of UML/STD
The notion of aspect is important as a systematic approach to the representation of cross-cutting concerns and the incremental additions of new functionalities to an existing syst...
Shin Nakajima, Tetsuo Tamai
119
Voted
SAC
2006
ACM
15 years 16 days ago
Transformation of B specifications into UML class diagrams and state machines
We propose a rule-based approach for transforming B abstract machines into UML diagrams. We believe that important insight into the structure underlying a B model can be gained by...
Houda Fekih, Leila Jemni Ben Ayed, Stephan Merz