Results 1 - 10
of
220
Towards Optimization-Safe Systems: Analyzing the Impact of Undefined Behavior
"... This paper studies an emerging class of software bugs called optimization-unstable code: code that is unexpectedly discarded by compiler optimizations due to undefined behavior in the program. Unstable code is present in many systems, including the Linux kernel and the Postgres database. The consequ ..."
Abstract
-
Cited by 20 (1 self)
- Add to MetaCart
This paper studies an emerging class of software bugs called optimization-unstable code: code that is unexpectedly discarded by compiler optimizations due to undefined behavior in the program. Unstable code is present in many systems, including the Linux kernel and the Postgres database
Rev. aa64576 2013-07-16 01:52:49-0400 Towards optimization-safe systems
"... This paper studies an emerging class of software bugs called optimization-unstable code: code that is unexpectedly eliminated by compiler optimizations due to undefined behavior in the program. This paper finds that such unstable code is present in many systems, including the Linux kernel and the Po ..."
Abstract
- Add to MetaCart
This paper studies an emerging class of software bugs called optimization-unstable code: code that is unexpectedly eliminated by compiler optimizations due to undefined behavior in the program. This paper finds that such unstable code is present in many systems, including the Linux kernel
ABSTRACT Analyzing Heap Error Behavior in Embedded JVM Environments
"... Recent studies have shown that transient hardware errors caused by external factors such as alpha particles and cosmic ray strikes can be responsible for a large percentage of system down-time. Denser processing technologies, increasing clock speeds, and low supply voltages used in embedded systems ..."
Abstract
- Add to MetaCart
system. Using several embedded Java applications, this paper first studies the tradeoffs between reliability, performance, and memory space overhead for two schemes that perform error checks at object and field granularities. We also study the impact of object characteristics (e.g., lifetime, re
CLUEBOX: A Performance Log Analyzer for Automated Troubleshooting
"... Performance problems in complex systems are often caused by underprovisioning, workload interference, incorrect expectations or bugs. Troubleshooting such systems is a difficult task faced by service engineers. We have built CLUEBOX, a non-intrusive toolkit that aids rapid problem diagnosis. It empl ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
troubleshooting of two scenarios that adversely impacted application response time: (1) an unknown competing workload, and (2) a file system consistency checker. By reducing the set of anomalous counters to examine to a dozen significant ones, CLUEBOX was able to guide a systems engineer towards identifying
Modeling and Analysis of the Behavior of GPRS Systems
- IEEE 6TH INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS
, 2001
"... The General Packet Radio Service (GPRS) has recently become a standard to extend the services provided by the Global System for Mobile Communications (GSM). GPRS addresses packetoriented traffic, by allowing a more efficient usage of the radio resources with a consequent improvement in the QoS ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
S of subscribers. This paper focuses on a preliminary evaluation of dependability and performance figures of the GPRS, by analyzing its behavior during the contention phase where users compete for the channel reservation using a random access procedure. The presented work constitutes the first step towards
Towards a Web-based Digital Repository: Identification of Needs and Behavior of Users
"... Web usage behavior of users have an impact on the development of a web-based application. Web usage analysis is therefore necessary so as to better serve the needs of a web-based application. The process involves analyzing interaction of a user with a web application. Web usage analysis provides use ..."
Abstract
- Add to MetaCart
Web usage behavior of users have an impact on the development of a web-based application. Web usage analysis is therefore necessary so as to better serve the needs of a web-based application. The process involves analyzing interaction of a user with a web application. Web usage analysis provides
Towards an Integrated Cognitive Architecture for
"... We outline the cognitive model CASS (Cognitive--Affective State System). As the name suggests it is a cognitive model that also takes human affect into account. CASS combines Dynamic Bayesian Networks (DBNs) and an ACT-R model. The DBN model (R-BARS, the Rensselaer Bayesian Affect Recognition System ..."
Abstract
- Add to MetaCart
changes in affective state to changes in the value of ACT-R's parameters so as to directly generate (i.e., predict) the influence of affect on cognition. The cognitive implications of the user's affective state are determined by analyzing the deviation of user behavior from the optimal path
Postelection Bargaining and Voter Behavior: Towards a General Spatial Theory of Voting
"... Abstract This paper derives a general spatial theory of voting based on Down's concept of a pure policy-oriented rational voter. Applying a modified Baron-Ferejohn model we include voter's perception of postelection bargaining in voter's evaluation of a party to derive a unified mode ..."
Abstract
- Add to MetaCart
unrealistic assumptions regarding voters' perception of postelection bargaining. (ii) The relative weight of the proximity component varies significantly across majoritarian and power sharing systems, and (iii) is additionally determined by party characteristics, i.e. party size, discipline and extremism
Biometric authentication revisited: Understanding the impact of wolves in sheep’s clothing
- In Proceedings of the 15 th Annual Usenix Security Symposium
, 2006
"... Biometric security is a topic of rapidly growing importance, especially as it applies to user authentication and key generation. In this paper, we describe our initial steps towards developing evaluation methodologies for behavioral biometrics that take into account threat models which have largely ..."
Abstract
-
Cited by 21 (10 self)
- Add to MetaCart
Biometric security is a topic of rapidly growing importance, especially as it applies to user authentication and key generation. In this paper, we describe our initial steps towards developing evaluation methodologies for behavioral biometrics that take into account threat models which have largely
USING PARTIAL LEAST SQUARE METHOD TO ASSESS THE IMPACTS OF DETERMINANTS ON CONTINUANCE INTENTION TOWARDS SELF-SERVICES TECHNOLOGIES
"... Self-Service Technologies (SSTs) can offer services by consumers or users themselves on the Internet and Websites. Types of SSTs include ATMs, interactive kiosks, online financing and so on. This study integrated relationship quality and the antecedents of Technology Acceptance Model (TAM) with Theo ..."
Abstract
- Add to MetaCart
) with Theory of Planned Behavior (TPB) to form a research model to understand and predict the users ' continuance intention toward self-service technologies. We used partial least square method to analyze the empirical data. This study found that the antecedents of TAM and TPB had the significant
Results 1 - 10
of
220