• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 2,524
Next 10 →

Modular verification of software components in C

by Sagar Chaki, Edmund Clarke, Alex Groce, et al. - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 2003
"... We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software systems into subproblems of manageable complexity. The decomposition reflects the mo ..."
Abstract - Cited by 233 (23 self) - Add to MetaCart
We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software systems into subproblems of manageable complexity. The decomposition reflects

Empir Software Eng DOI 10.1007/s10664-013-9284-6 Management of community contributions A case study on the Android and Linux software ecosystems

by Nicolas Bettenburg, Ahmed E. Hassan, Bram Adams, Daniel M. German, A. E. Hassan, B. Adams, D. M. German
"... Abstract In recent years, many companies have realized that collaboration with a thriving user or developer community is a major factor in creating innovative technol-ogy driven by market demand. As a result, businesses have sought ways to stimulate contributions from developers outside their corpor ..."
Abstract - Add to MetaCart
) system having a hybrid contribution style, with a not-for-profit (LINUX kernel) system having an open contribution style. To guide our comparisons, we base our analysis on a conceptual model of contribution management that we derived from a total of seven major open-source software systems. A

COPASI -- a COmplex PAthway SImulator

by Stefan Hoops, Sven Sahle, Ralph Gauges, Christine Lee, Jürgen Pahle, Natalia Simus, Mudita Singhal, Liang Xu, Pedro Mendes, Ursula Kummer - BIOINFORMATICS , 2006
"... Motivation: Simulation and modeling is becoming a standard approach to understand complex biochemical processes. Therefore, there is a big need for software tools that allow access to diverse simulation and modeling methods as well as support for the usage of these methods. Results: Here, we present ..."
Abstract - Cited by 270 (6 self) - Add to MetaCart
, and the importance of random number generator numerical resolution in stochastic simulation. Availability: The complete software is available in binary (executable) for MS Windows, OS X, Linux (Intel), and Sun Solaris (SPARC), as well as the full source code under an open source license from

McRT-STM: a High Performance Software Transactional Memory System for a Multi-Core Runtime

by Bratin Saha, Ali-reza Adl-tabatabai, Richard L. Hudson, Chi Cao Minh, Benjamin Hertzberg - In Proc. of the 11th ACM Symp. on Principles and Practice of Parallel Programming , 2006
"... Applications need to become more concurrent to take advantage of the increased computational power provided by chip level multiprocessing. Programmers have traditionally managed this concurrency using locks (mutex based synchronization). Unfortunately, lock based synchronization often leads to deadl ..."
Abstract - Cited by 241 (14 self) - Add to MetaCart
to deadlocks, makes fine-grained synchronization difficult, hinders composition of atomic primitives, and provides no support for error recovery. Transactions avoid many of these problems, and therefore, promise to ease concurrent programming. We describe a software transactional memory (STM) system

Vertigo: Automatic performance-setting for linux

by Krisztián Flautner, Trevor Mudge , 2002
"... Combining high performance with low power consumption is becoming one of the primary objectives of processor designs. Instead of relying just on sleep mode for conserving power, an increasing number of processors take advantage of the fact that reducing the clock frequency and corresponding operati ..."
Abstract - Cited by 123 (4 self) - Add to MetaCart
operating voltage of the CPU can yield quadratic decrease in energy use. However, performance reduction can only be beneficial if it is done transparently, without causing the software to miss its deadlines. In this paper, we describe the implementation and performance-setting algorithms used in

Working for Free? Motivations for Participating in Open-Source Projects

by Alexander Hars - International Journal of Electronic Commerce , 2002
"... The success of the Linux operating system has demonstrated the viability of an alternative form of software development – open source software – that challenges traditional assumptions about software markets. Understanding what drives open source developers to participate in open source projects is ..."
Abstract - Cited by 252 (0 self) - Add to MetaCart
The success of the Linux operating system has demonstrated the viability of an alternative form of software development – open source software – that challenges traditional assumptions about software markets. Understanding what drives open source developers to participate in open source projects

l l

by Purdue E-pubs, Prem Gopalan, Seung Chul Han, David K. Y. Yau, Xuxian Jiang, Puneet Zaroo, Prem Gopalan, Seung Chul Han, David K. Y. Yau, Xuxian Jiang, Puneet Zaroo, John C. S. Lui, Ra Able, Prem Gopalan, Seung Chul Han, David K. Y. Yau, Xuxinn Jiang, Puneet Zaroo, John C. S. Lui , 2001
"... Application Performance on the CROSS/Linux Software-~ro grammable Router ..."
Abstract - Add to MetaCart
Application Performance on the CROSS/Linux Software-~ro grammable Router

EROS: a fast capability system

by Jonathan S. Shapiro, Jonathan M. Smith, David J. Farber - In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP’99), pages 170–185, Kiawah Island Resort , 1999
"... EROS is a capability-based operating system for commodity processors which uses a single level storage model. The single level store's persistence is transparent to applications. The performance consequences of support for transparent persistence and capability-based architectures are generally ..."
Abstract - Cited by 236 (29 self) - Add to MetaCart
are generally believed to be negative. Surprisingly, the basic operations of EROS (such as IPC) are generally comparable in cost to similar operations in conventional systems. This is demonstrated with a set of microbenchmark measurements of semantically similar operations in Linux. The EROS system achieves its

RouteBricks: Exploiting Parallelism to Scale Software Routers

by Mihai Dobrescu, Norbert Egi, Katerina Argyraki, Byung-gon Chun, Kevin Fall, Gianluca Iannaccone, Allan Knies, Maziar Manesh, Sylvia Ratnasamy - In Proceedings of the 22nd ACM Symposium on Operating Systems Principles , 2009
"... We revisit the problem of scaling software routers, motivated by recent advances in server technology that enable highspeed parallel processing—a feature router workloads appear ideally suited to exploit. We propose a software router architecture that parallelizes router functionality both across mu ..."
Abstract - Cited by 173 (15 self) - Add to MetaCart
We revisit the problem of scaling software routers, motivated by recent advances in server technology that enable highspeed parallel processing—a feature router workloads appear ideally suited to exploit. We propose a software router architecture that parallelizes router functionality both across

Countering Code-Injection Attacks With Instruction-Set Randomization

by Gaurav S. Kc - In Proceedings of the ACM Computer and Communications Security (CCS) Conference , 2003
"... We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker who does ..."
Abstract - Cited by 234 (26 self) - Add to MetaCart
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker who does
Next 10 →
Results 11 - 20 of 2,524
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University