• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 41,001
Next 10 →

Table 2. Invariant Preservation Verification

in Verifying the Mondex case study
by Peter H. Schmitt, Universität Karlsruhe 2007
Cited by 3

Table 2: Summary of function pointer declarations Program Globals Local Formal

in Function Pointers in C - An Empirical Study
by Anand Shah, Barbara G. Ryder 1995
"... In PAGE 4: ... 5.2 Declarations of function pointers Table2 deals with the questions regarding declaration of function pointers and the scopes within which they are declared. In Program, we list the name of the program and its lines of code.... ..."
Cited by 1

Table 1: Global and Local Program Modi#1Ccations.

in Effective Function Cache Management for Incremental Attribute Evaluation
by João Saraiva, Matthijs Kuiper, Doaitse Swierstra

Table 2: Controller Verification

in Verifiable Concurrent Programming Using Concurrency Controllers
by Aysu Betin-can, Tevfik Bultan 2004
"... In PAGE 8: ...2), AIRPORT is the concurrency controller for an Airport Ground Traffic Control simulation program mentioned in Section 3, BB is a bounded buffer, BB-MUTEX is a bounded buffer with a mutex lock, BB-RW is a bounded buffer with a reader-writer lock, and BARRIER is a controller for bar- rier synchronization. Table2 shows the performance results for the verification of these concurrency controllers. The columns labeled T1 and M1 denote the time and the mem- ory usage for the behavior verification by the Action Lan- guage Verifier.... In PAGE 8: ... Hence, we do not need to consider all possible thread interleavings during interface verification. In Table2 , the last two columns (T2 and M2) show the time and memory usage of JPF during the interface verifi- cation. The memory usage is low since we use stubs with fi- nite reachable state spaces and we do not have to consider all possible thread interleavings.... In PAGE 8: ... The memory usage is low since we use stubs with fi- nite reachable state spaces and we do not have to consider all possible thread interleavings. For the examples reported in Table2 we verified the thread implementations by run- ning a single instance of each thread class in isolation. JPF successfully verifies the problem instances with stubs with- out exhausting memory.... ..."
Cited by 13

Table 1. Tables showing the number of matches found between the key frames of figure 5 at various stages of the matching algorithm. The image represents the table in each row with intensity coding the number of matches (darker indicates more matches). Frames D2 and D2B7BH correspond. The diagonal entries are not included. (a) matches from invariant indexing alone. (b) matches after neighbourhood consensus. (c) matches after local correlation/registration verification. (d) matches after guided search and global verification by robustly computing epipolar geometry. Note how the stripe corresponding to the correct entries becomes progressively clearer.

in unknown title
by unknown authors 2002
Cited by 13

Table 1. Tables showing the number of matches found between the key frames of figure 5 at various stages of the matching algorithm. The image represents the table in each row with intensity coding the number of matches (darker indicates more matches). Frames a0 and a0 a1a3a2 correspond. The diagonal entries are not included. (a) matches from invariant indexing alone. (b) matches after neighbourhood consensus. (c) matches after local correlation/registration verification. (d) matches after guided search and global verification by robustly computing epipolar geometry. Note how the stripe corresponding to the correct entries becomes progressively clearer.

in unknown title
by unknown authors 2002
Cited by 13

Table 1. Tables showing the number of matches found between the key frames of figure 5 at var- ious stages of the matching algorithm. The image represents the table in each row with intensity coding the number of matches (darker indicates more matches). Frames n and n + 5 correspond. The diagonal entries are not included. (a) matches from invariant indexing alone. (b) matches after neighbourhood consensus. (c) matches after local correlation/registration verification. (d) matches after guided search and global verification by robustly computing epipolar geometry. Note how the stripe corresponding to the correct entries becomes progressively clearer.

in unknown title
by unknown authors 2004
Cited by 2

Table 1. Tables showing the number of matches found between the key frames of figure 5 at var- ious stages of the matching algorithm. The image represents the table in each row with intensity coding the number of matches (darker indicates more matches). Frames n and n + 5 correspond. The diagonal entries are not included. (a) matches from invariant indexing alone. (b) matches after neighbourhood consensus. (c) matches after local correlation/registration verification. (d) matches after guided search and global verification by robustly computing epipolar geometry. Note how the stripe corresponding to the correct entries becomes progressively clearer.

in unknown title
by unknown authors

Table 1 shows that the first few global passes rapidly reduce the number of

in Efficient convexity and domination algorithms for fine- and medium-grain hypercube computers
by Ed Cohen, Russ Miller, Elias M. Sarraf, Quentin F. Stout 1992
Cited by 2

Table 1: Concurrency characteristics of benchmarks.

in Efficient Memory Management for Message-Passing Concurrency
by Uppsala University, Jesper Wilhelmsson, Part I Single-threaded Execution, Jesper Wilhelmsson 2005
"... In PAGE 42: ... Only three of these nodes are used as benchmarks, namely a network TMOS server, a network coordinator, and the alarm server. Some additional information about the benchmarks is contained in Table1 . De- tailed statistics about message sizes can be found in [46].... In PAGE 43: ...PERFORMANCE EVALUATION Benchmark Processes Messages ring 100 100,000 life 100 800,396 eddie 2 2,121 BEAM compiler 6 2,481 NETSim TMOS 4,066 58,853 NETSim coordinator 591 202,730 NETSim alarm server 12,353 288,675 procs 100x100 100 6,262 procs 1000x100 1,000 512,512 procs 100x1000 100 6,262 procs 1000x1000 1,000 512,512 Table1 : Number of processes and messages. a consistent picture, we decided to also use this machine for all other benchmarks too.... In PAGE 45: ... This is to some ex- tent expected, since NETSim is a commercial product developed over many years using a private heap-based Erlang/OTP system and tuned in order to avoid garbage collection and reduce send times. For example, from the number of processes in Table1 and the maximum total heap sizes which these programs allocate (data shown in Table 2), it is clear that in the NETSim programs either the majority of the processes do not trigger garbage collection in the private heap system as their heaps are small, or processes are used as a means to get no-cost heap reclamation. As a result, the possible gain from a different memory architecture cannot be big.... In PAGE 45: ... Indeed, as observed in the case of NETSim alarm server, the large root set (cf. Table1 ) can seriously increase the time spent in garbage collection and slow down execution of a program which has been tuned for a private heap architecture. We suspect that the general speedup for the mutator in the shared heap system is due to better cache locality: partly due to requiring fewer garbage collections by sharing data between processes and partly due to having heap data in cache when switching between processes.... In PAGE 69: ...02% nag - keep 1000x250 50,329,185 100% lt; 0.02% Table1 : Numbers of messages sent and (partially) copied in the hybrid system. 6.... In PAGE 69: ... 6.2 Effectiveness of the message analysis Table1 shows numbers of messages and words copied between the process-local heaps and the message area in the hybrid system, both when the message analysis is not used2 and when it is. In the life benchmark, we see that while there is hardly any reuse of message data, so that the plain hybrid system cannot avoid copying data from the local heaps to the shared area, when the analysis is used the amount of copying shrinks to zero.... In PAGE 71: ... The hybrid system with analysis is about 10% faster than the process-centric system, but we can see that although enabling the analysis removes the need for actual copying of message data (cf. Table1 ), we still have a small overhead for the runtime safety check performed at each send operation (this could in principle be removed), which is comparable to the total copying time in the process-centric system when messages are very small. We can also see how the slightly more complicated bookkeeping for sending messages is noticeable in the process-centric system, and how on the other hand the mutator time can be larger in the hybrid system.... In PAGE 93: ... Although this program takes a very small time to complete, we use it as a benchmark because it spawns a large number of simultaneously live processes (cf. Table1 ) and thus its root set is quite large. adhoc A framework for genetic algorithms.... ..."
Next 10 →
Results 1 - 10 of 41,001
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University