• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 220
Next 10 →

Towards Optimization-Safe Systems: Analyzing the Impact of Undefined Behavior

by Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, O Solar-lezama
"... This paper studies an emerging class of software bugs called optimization-unstable code: code that is unexpectedly discarded by compiler optimizations due to undefined behavior in the program. Unstable code is present in many systems, including the Linux kernel and the Postgres database. The consequ ..."
Abstract - Cited by 20 (1 self) - Add to MetaCart
This paper studies an emerging class of software bugs called optimization-unstable code: code that is unexpectedly discarded by compiler optimizations due to undefined behavior in the program. Unstable code is present in many systems, including the Linux kernel and the Postgres database

Rev. aa64576 2013-07-16 01:52:49-0400 Towards optimization-safe systems

by Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, O Solar-lezama
"... This paper studies an emerging class of software bugs called optimization-unstable code: code that is unexpectedly eliminated by compiler optimizations due to undefined behavior in the program. This paper finds that such unstable code is present in many systems, including the Linux kernel and the Po ..."
Abstract - Add to MetaCart
This paper studies an emerging class of software bugs called optimization-unstable code: code that is unexpectedly eliminated by compiler optimizations due to undefined behavior in the program. This paper finds that such unstable code is present in many systems, including the Linux kernel

ABSTRACT Analyzing Heap Error Behavior in Embedded JVM Environments

by G. Chen, N. Vijaykrishnan, A. Sivasubramaniam, M. J. Irwin
"... Recent studies have shown that transient hardware errors caused by external factors such as alpha particles and cosmic ray strikes can be responsible for a large percentage of system down-time. Denser processing technologies, increasing clock speeds, and low supply voltages used in embedded systems ..."
Abstract - Add to MetaCart
system. Using several embedded Java applications, this paper first studies the tradeoffs between reliability, performance, and memory space overhead for two schemes that perform error checks at object and field granularities. We also study the impact of object characteristics (e.g., lifetime, re

CLUEBOX: A Performance Log Analyzer for Automated Troubleshooting

by S. Ratna S, M. Swapna, Thirumale Niranjan, Sai Susarla, Siddhartha N
"... Performance problems in complex systems are often caused by underprovisioning, workload interference, incorrect expectations or bugs. Troubleshooting such systems is a difficult task faced by service engineers. We have built CLUEBOX, a non-intrusive toolkit that aids rapid problem diagnosis. It empl ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
troubleshooting of two scenarios that adversely impacted application response time: (1) an unknown competing workload, and (2) a file system consistency checker. By reducing the set of anomalous counters to examine to a dozen significant ones, CLUEBOX was able to guide a systems engineer towards identifying

Modeling and Analysis of the Behavior of GPRS Systems

by F. Tataranni, S. Porcarelli, F. Di Giandomenico, A. Bondavalli, L. Simoncini - IEEE 6TH INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS , 2001
"... The General Packet Radio Service (GPRS) has recently become a standard to extend the services provided by the Global System for Mobile Communications (GSM). GPRS addresses packetoriented traffic, by allowing a more efficient usage of the radio resources with a consequent improvement in the QoS ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
S of subscribers. This paper focuses on a preliminary evaluation of dependability and performance figures of the GPRS, by analyzing its behavior during the contention phase where users compete for the channel reservation using a random access procedure. The presented work constitutes the first step towards

Towards a Web-based Digital Repository: Identification of Needs and Behavior of Users

by Wasiwasi J. Mgonzo, Zaipuna O. Yonah
"... Web usage behavior of users have an impact on the development of a web-based application. Web usage analysis is therefore necessary so as to better serve the needs of a web-based application. The process involves analyzing interaction of a user with a web application. Web usage analysis provides use ..."
Abstract - Add to MetaCart
Web usage behavior of users have an impact on the development of a web-based application. Web usage analysis is therefore necessary so as to better serve the needs of a web-based application. The process involves analyzing interaction of a user with a web application. Web usage analysis provides

Towards an Integrated Cognitive Architecture for

by Modeling And Recognizing, Qiang Ji, Wayne D. Gray, Markus Guhe, Michael J. Schoelles
"... We outline the cognitive model CASS (Cognitive--Affective State System). As the name suggests it is a cognitive model that also takes human affect into account. CASS combines Dynamic Bayesian Networks (DBNs) and an ACT-R model. The DBN model (R-BARS, the Rensselaer Bayesian Affect Recognition System ..."
Abstract - Add to MetaCart
changes in affective state to changes in the value of ACT-R's parameters so as to directly generate (i.e., predict) the influence of affect on cognition. The cognitive implications of the user's affective state are determined by analyzing the deviation of user behavior from the optimal path

Postelection Bargaining and Voter Behavior: Towards a General Spatial Theory of Voting

by Christian H C A Henning , Melvin Hinich , Susumu Shikano
"... Abstract This paper derives a general spatial theory of voting based on Down's concept of a pure policy-oriented rational voter. Applying a modified Baron-Ferejohn model we include voter's perception of postelection bargaining in voter's evaluation of a party to derive a unified mode ..."
Abstract - Add to MetaCart
unrealistic assumptions regarding voters' perception of postelection bargaining. (ii) The relative weight of the proximity component varies significantly across majoritarian and power sharing systems, and (iii) is additionally determined by party characteristics, i.e. party size, discipline and extremism

Biometric authentication revisited: Understanding the impact of wolves in sheep’s clothing

by Lucas Ballard - In Proceedings of the 15 th Annual Usenix Security Symposium , 2006
"... Biometric security is a topic of rapidly growing importance, especially as it applies to user authentication and key generation. In this paper, we describe our initial steps towards developing evaluation methodologies for behavioral biometrics that take into account threat models which have largely ..."
Abstract - Cited by 21 (10 self) - Add to MetaCart
Biometric security is a topic of rapidly growing importance, especially as it applies to user authentication and key generation. In this paper, we describe our initial steps towards developing evaluation methodologies for behavioral biometrics that take into account threat models which have largely

USING PARTIAL LEAST SQUARE METHOD TO ASSESS THE IMPACTS OF DETERMINANTS ON CONTINUANCE INTENTION TOWARDS SELF-SERVICES TECHNOLOGIES

by Shih-chih Chen, Chih-chun Kung
"... Self-Service Technologies (SSTs) can offer services by consumers or users themselves on the Internet and Websites. Types of SSTs include ATMs, interactive kiosks, online financing and so on. This study integrated relationship quality and the antecedents of Technology Acceptance Model (TAM) with Theo ..."
Abstract - Add to MetaCart
) with Theory of Planned Behavior (TPB) to form a research model to understand and predict the users ' continuance intention toward self-service technologies. We used partial least square method to analyze the empirical data. This study found that the antecedents of TAM and TPB had the significant
Next 10 →
Results 1 - 10 of 220
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University