CS Store Search
Displaying 1-15 out of 15 total
Deadline-aware scheduling for Software Transactional Memory
Dependable Systems and Networks, International Conference on
By Walther Maldonado,Patrick Marlier,Pascal Felber,Julia Lawall,Giller Muller,Etienne Riviere
Issue Date:June 2011
Software Transactional Memory (STM) is an optimistic concurrency control mechanism that simplifies the development of parallel programs. Still, the interest of STM has not yet been demonstrated for reactive applications that require bounded response time f...
High-level Programming Support for Robust Pervasive Computing Applications
Pervasive Computing and Communications, IEEE International Conference on
By Wilfried Jouve, Julien Lancia, Nicolas Palix, Charles Consel, Julia Lawall
Issue Date:March 2008
In this paper, we present a domain-speciﬁc Interface Deﬁnition Language (IDL) and its compiler, dedicated to the development of pervasive computing applications. Our IDL provides declarative support for concisely characterizing a pervasive computing enviro...
Safe Integration of New Concerns in a Software Architecture
Engineering of Computer-Based Systems, IEEE International Conference on the
By Olivier Barais, Anne-Francoise Le Meur, Laurence Duchien, Julia Lawall
Issue Date:March 2006
<p>Software architectures must frequently evolve to cope with changing requirements, and this evolution often implies integrating new concerns. Unfortunately, existing architecture description languages provide little or no support for this kind of e...
Providing Support for Safe Software Architecture Transformations
Software Architecture, Working IEEE/IFIP Conference on
By Olivier Barais, Julia Lawall, Anne-Francoise Le Meur, Laurence Duchien
Issue Date:November 2005
Software architecture is a key concept in the design of a complex system. An architecture models the structure and behavior of the system, including the software elements and the relationships between them. While architectures were originally specified inf...
BtrPlace: A Flexible Consolidation Manager for Highly Available Applications
IEEE Transactions on Dependable and Secure Computing
By Fabien Hermenier,Julia Lawall,Gilles Muller
Issue Date:September 2013
The massive amount of resources found in data centers makes it possible to provide high availability to multitier applications. Virtualizing these applications makes it possible to consolidate them on servers, reducing runtime costs. Nevertheless, replicat...
Zebu: A Language-Based Approach for Network Protocol Message Processing
IEEE Transactions on Software Engineering
By Laurent Burgy, Laurent Réveillère, Julia Lawall, Gilles Muller
Issue Date:July 2011
A network application communicates with other applications according to a set of rules known as a protocol. This communication is managed by the part of the application known as the protocol-handling layer, which enables the manipulation of protocol messag...
Finding Error Handling Bugs in OpenSSL Using Coccinelle
European Dependable Computing Conference
By Julia Lawall, Ben Laurie, René Rydhof Hansen, Nicolas Palix, Gilles Muller
Issue Date:April 2010
OpenSSL is a library providing various functionalities relating to secure network communication. Detecting and fixing bugs in OpenSSL code is thus essential, particularly when such bugs can lead to malicious attacks. In previous work, we have proposed a me...
Automated library recommendation
2013 20th Working Conference on Reverse Engineering (WCRE)
By Ferdian Thung,David Lo,Julia Lawall
Issue Date:October 2013
Many third party libraries are available to be downloaded and used. Using such libraries can reduce development time and make the developed software more reliable. However, developers are often unaware of suitable libraries to be used for their projects an...
Understanding the genetic makeup of Linux device drivers
Found in: Proceedings of the Seventh Workshop on Programming Languages and Operating Systems (PLOS '13)
By David Lo, Gilles Muller, Julia Lawall, Laurent Réveillère, Lingxiao Jiang, Peter Senna Tschudin
Issue Date:November 2013
Attempts have been made to understand driver development in terms of code clones. In this paper, we propose an alternate view, based on the metaphor of a gene. Guided by this metaphor, we study the structure of Linux 3.10 ethernet platform driver probe fun...
Leveraging software architectures to guide and verify the development of sense/compute/control applications
Found in: Proceeding of the 33rd international conference on Software engineering (ICSE '11)
By Charles Consel, Damien Cassou, Emilie Balland, Julia Lawall
Issue Date:May 2011
A software architecture describes the structure of a computing system by specifying software components and their interactions. Mapping a software architecture to an implementation is a well known challenge. A key element of this mapping is the architectur...
An approach to improving the structure of error-handling code in the linux kernel
Found in: Proceedings of the 2011 SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems (LCTES '11)
By Gilles Muller, Julia Lawall, Suman Saha
Issue Date:April 2011
The C language does not provide any abstractions for exception handling or other forms of error handling, leaving programmers to devise their own conventions for detecting and handling errors. The Linux coding style guidelines suggest placing error handlin...
An automated approach for finding variable-constant pairing bugs
Found in: Proceedings of the IEEE/ACM international conference on Automated software engineering (ASE '10)
By David Lo, Julia Lawall
Issue Date:September 2010
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically depends on the correct usage of these values. Nevertheless, compilers for the la...
Tracking code patterns over multiple software versions with Herodotos
Found in: Proceedings of the Eighth International Conference on Aspect-Oriented Software Development (AOSD '10)
By Gilles Muller, Julia Lawall, Nicolas Palix
Issue Date:March 2010
An important element of understanding a software code base is to identify the repetitive patterns of code it contains and how these evolve over time. Some patterns are useful to the software, and may be modularized. Others are detrimental to the software, ...
Entropy: a consolidation manager for clusters
Found in: Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments (VEE '09)
By Fabien Hermenier, Gilles Muller, Jean-Marc Menaud, Julia Lawall, Xavier Lorca
Issue Date:March 2009
Clusters provide powerful computing environments, but in practice much of this power goes to waste, due to the static allocation of tasks to nodes, regardless of their changing computational requirements. Dynamic consolidation is an approach that migrates ...
Memory-manager/scheduler co-design: optimizing event-driven servers to improve cache behavior
Found in: Proceedings of the 2006 international symposium on Memory management (ISMM '06)
By Charles Consel, Julia Lawall, Sapan Bhatia
Issue Date:June 2006
Event-driven programming has emerged as a standard to implement high-performance servers due to its flexibility and low OS overhead. Still, memory access remains a bottleneck. Generic optimization techniques yield only small improvements in the memory acce...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.