Sciweavers

241 search results - page 41 / 49
» Trace analysis of Erlang programs
Sort
View
ISPASS
2006
IEEE
15 years 9 months ago
Considering all starting points for simultaneous multithreading simulation
Commercial processors have support for Simultaneous Multithreading (SMT), yet little work has been done to provide representative simulation results for SMT. Given a workload, cur...
Michael Van Biesbrouck, Lieven Eeckhout, Brad Cald...
139
Voted
KBSE
2006
IEEE
15 years 9 months ago
Detecting Precedence-Related Advice Interference
Aspect-Oriented Programming (AOP) has been proposed in literature to overcome modularization shortcomings such as the tyranny of the dominant decomposition. However, the new langu...
Maximilian Storzer, Florian Forster
127
Voted
ASPLOS
2004
ACM
15 years 9 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
153
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
131
Voted
WCRE
1999
IEEE
15 years 8 months ago
Recovering Code to Documentation Links in OO Systems
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual pages...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...