Search
Now showing items 131-140 of 151
Automatic Error Elimination by Multi-Application Code Transfer
(2014-09-30)
We present pDNA, a system for automatically transfer- ring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using six donor applications ...
Automatic Error Elimination by Multi-Application Code Transfer
(2014-08-11)
We present pDNA, a system for automatically transferring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using three donor applications ...
Automatic Error Elimination by Multi-Application Code Transfer
(2014-10-02)
We present pDNA, a system for automatically transfer- ring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using six donor applications ...
Automatic Error Elimination by Multi-Application Code Transfer
(2014-10-02)
We present Code Phage (CP), a system for automatically transferring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using six donor ...
OpLog: a library for scaling update-heavy data structures
(2014-09-16)
Existing techniques (e.g., RCU) can achieve good multi-core scaling for read-mostly data, but for update-heavy data structures only special-purpose techniques exist. This paper presents OpLog, a general-purpose library ...
Constraint Generation for the Jeeves Privacy Language
(2014-10-01)
Our goal is to present a completed, semantic formalization of the Jeeves privacy language evaluation engine, based on the original Jeeves constraint semantics defined by Yang et al at POPL12, but sufficiently strong to ...
An Analyst's Assistant for the Interpretation of Vehicle Track Data
(2014-10-08)
This report describes the Analyst's Assistant, a software system for language-interactive, collaborative user-system interpretation of events, specifically targeting vehicle events that can be recognized on the basis of ...
Scalable attack modelling in support of security information and event management
(2014)
While assessing security on single devices can be performed using vulnerability assessment tools, modelling of more intricate attacks, which incorporate multiple steps on different machines, requires more advanced techniques. ...
Lattice Boltzmann liquid simulations on graphics hardware
(2014)
Fluid simulation is widely used in the visual effects industry. The high level of detail required to produce realistic visual effects requires significant computation. Usually, expensive computer clusters are used in order ...
Cicada: Predictive Guarantees for Cloud Network Bandwidth
(2014-03-24)
In cloud-computing systems, network-bandwidth guarantees have been shown to improve predictability of application performance and cost. Most previous work on cloud-bandwidth guarantees has assumed that cloud tenants know ...