• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,883
Next 10 →

Runtime Analysis of Binary PSO

by Dirk Sudholt, Carsten Witt
"... We investigate the runtime of the Binary Particle Swarm Optimization (PSO) algorithm introduced by Kennedy and Eberhart (1997). The Binary PSO maintains a global best solution and a swarm of particles. Each particle consists of a current position, an own best position and a velocity vector used in a ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
We investigate the runtime of the Binary Particle Swarm Optimization (PSO) algorithm introduced by Kennedy and Eberhart (1997). The Binary PSO maintains a global best solution and a swarm of particles. Each particle consists of a current position, an own best position and a velocity vector used

Runtime Analysis of EAs

by Duc-cuong Dang, Per Kristian Lehre, Warm Up Leadingones , 2015
"... Conclusion ..."
Abstract - Add to MetaCart
Conclusion

Instrumentation of Java Bytecode for Runtime Analysis

by Allen Goldberg, Klaus Havelund - In Proc. Formal Techniques for Java-like Programs, volume 408 of Technical Reports from ETH , 2003
"... Abstract. This paper describes JSpy, a system for high-level instrumentation of Java bytecode and its use with JPaX, our system for runtime analysis of Java programs. JPaX monitors the execution of temporal logic formulas and performs predicative analysis of deadlocks and data races. JSpy’s input is ..."
Abstract - Cited by 16 (6 self) - Add to MetaCart
Abstract. This paper describes JSpy, a system for high-level instrumentation of Java bytecode and its use with JPaX, our system for runtime analysis of Java programs. JPaX monitors the execution of temporal logic formulas and performs predicative analysis of deadlocks and data races. JSpy’s input

Runtime analysis of convex evolutionary search

by Alberto Moraglio, Dirk Sudholt - In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2012 , 2012
"... Geometric crossover formalises the notion of crossover oper-ator across representations. In previous work, it was shown that all evolutionary algorithms with geometric crossover (but with no mutation) do a generalised form of convex search. Furthermore, it was suggested that these search al-gorithms ..."
Abstract - Add to MetaCart
-gorithms could perform well on concave and approximately concave fitness landscapes. In this paper, we study the run-time of a generalised form of convex search on concave fit-ness landscapes. This is a first step towards linking a geo-metric theory of representations and runtime analysis in the attempt to (i

Debugging, Advanced Debugging and Runtime Analysis

by Salim Istyaq, Aufaq Zargar
"... Abstract—This paper discusses debugging and runtime analysis of software and outlines its enormous benefits to software developers and testers. A debugger is usually quite helpful in tracking down many logic problems. However, even with the most advanced debugger at your disposal, it doesn't gu ..."
Abstract - Add to MetaCart
Abstract—This paper discusses debugging and runtime analysis of software and outlines its enormous benefits to software developers and testers. A debugger is usually quite helpful in tracking down many logic problems. However, even with the most advanced debugger at your disposal, it doesn

Runtime analysis of atomicity for multi-threaded programs

by Liqiang Wang, Scott D. Stoller - IEEE Transactions on Software Engineering , 2006
"... Abstract—Atomicity is a correctness condition for concurrent systems. Informally, atomicity is the property that every concurrent execution of a set of transactions is equivalent to some serial execution of the same transactions. In multithreaded programs, executions of procedures (or methods) can b ..."
Abstract - Cited by 93 (9 self) - Add to MetaCart
algorithms for runtime detection of atomicity violations and compares their cost and effectiveness. The reduction-based algorithm checks atomicity based on commutativity properties of events in a trace; the block-based algorithm efficiently represents the relevant information about a trace as a set of blocks

Decentralized Runtime Analysis of Multithreaded Applications

by Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu
"... Violations of a number of common safety properties of multithreaded programs--such as atomicity, mutual exclusion and absence of dataraces--cannot be observed by looking at the linear execution trace. We characterize a class of such properties, called robust properties, and define a simple but expre ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Violations of a number of common safety properties of multithreaded programs--such as atomicity, mutual exclusion and absence of dataraces--cannot be observed by looking at the linear execution trace. We characterize a class of such properties, called robust properties, and define a simple but expressive epistemic logic to specify them. We then develop an efficient algorithm to automatically monitor and predict violations of robust safety properties. Our algorithm is based on capturing the causal structure of a computation through a mechanism similar to vector clock updates. The algorithm automatically synthesizes decentralized monitors to evaluate the information at each thread and to detect and predict safety violations. Based on this approach, a tool named DAME has been developed and evaluated on some simple examples.

Predictive Runtime Analysis of Multithreaded Programs ⋆

by Feng Chen
"... Abstract. We present a technique to predict property violations in multi-threaded programs from successful executions. An appealing aspect of our technique is that it is entirely automatic; another is that no special simulation or modeling infrastructure is needed. All the user needs to do is to pro ..."
Abstract - Add to MetaCart
generalized “happens-before ” causal partial order that is refined with control-flow and data-flow dependency information obtained apriory via static analysis of the program, the observer is able to build from one concrete execution trace a set of abstract execution traces. Those abstract execution traces

Model Checking Programs

by Willem Visser, Klaus Havelund, GUILLAUME BRAT, SEUNGJOON PARK, FLAVIO LERDA , 2003
"... The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it easier to experiment with mechanized formal methods such as theorem provers, proof checkers and model checkers. In this pape ..."
Abstract - Cited by 592 (63 self) - Add to MetaCart
, slicing, abstraction, and runtime analysis techniques to reduce the state space. JPF has been applied to a real-time avionics operating system developed at Honeywell, illustrating an intricate error, and to a model of a spacecraft controller, illustrating the combination of abstraction, runtime analysis

Using Runtime Analysis to Guide Model Checking of Java Programs

by Klaus Havelund , 2000
"... . This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java programs. Runtime analysis is based on the idea of executing the program once, and observing the generated run to ex ..."
Abstract - Cited by 86 (16 self) - Add to MetaCart
. This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java programs. Runtime analysis is based on the idea of executing the program once, and observing the generated run
Next 10 →
Results 1 - 10 of 4,883
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University