Results 291 to 300 of about 127,476 (326)
Some of the next articles are maybe not open access.
Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming, 2012
In program debugging, reproducibility of bugs is a key requirement. Unfortunately, bugs in concurrent programs are notoriously difficult to reproduce because bugs due to concurrency happen under very specific thread schedules and the likelihood of taking such corner-case schedules during regular testing is very low. We propose concurrent breakpoints, a
Chang-Seo Park, Koushik Sen
openaire +2 more sources
In program debugging, reproducibility of bugs is a key requirement. Unfortunately, bugs in concurrent programs are notoriously difficult to reproduce because bugs due to concurrency happen under very specific thread schedules and the likelihood of taking such corner-case schedules during regular testing is very low. We propose concurrent breakpoints, a
Chang-Seo Park, Koushik Sen
openaire +2 more sources
Breakpoints and breakpoint detection in source-level emulation
ACM Transactions on Design Automation of Electronic Systems, 1998We present an approach for accelerating the validation speed of behavioral system descriptions through hardware emulation. The method allows source-level debuggingof running hardware specified in behavioral VH DL in a way similar to sorce-leve debugging in software programing languages.
Koch, Gernot+2 more
openaire +2 more sources
EUCAST breakpoints for antifungals
Drug News & Perspectives, 2010Susceptibility testing of fungi and development of interpretative breakpoints has become increasingly important due to the growing incidence of invasive fungal infections, the number and classes of antifungals, and the emerging reports of acquired resistance.
Rodriguez-Tudela, J.L.+4 more
openaire +4 more sources
21st Annual Computer Security Applications Conference (ACSAC'05), 2006
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruction level. One of the important services provided by a debugger is the ability to stop execution of code at an arbitrary point during runtime, using breakpoints.
Ramesh Yerraballi, Amit Vasudevan
openaire +2 more sources
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruction level. One of the important services provided by a debugger is the ability to stop execution of code at an arbitrary point during runtime, using breakpoints.
Ramesh Yerraballi, Amit Vasudevan
openaire +2 more sources
Antimicrobial Susceptibility Breakpoints
Treatments in Respiratory Medicine, 2005Since the early 1960s, considerable advancements have been made to standardize and provide quality assurance for clinical susceptibility testing procedures of antimicrobial agents. Controversy, however, remains as to the interpretation of clinical laboratory susceptibility test results.
openaire +3 more sources
Science, 2002
GENETICS Microorganisms can restructure their genomes in response to environmental pressures. When glucose is scarce, budding yeast sequentially acquire mutations that enable “evolved” clones to assimilate glucose more rapidly than their ancestors. Further work has hinted that this capacity is enabled by gene amplification, but other mechanisms may ...
openaire +2 more sources
GENETICS Microorganisms can restructure their genomes in response to environmental pressures. When glucose is scarce, budding yeast sequentially acquire mutations that enable “evolved” clones to assimilate glucose more rapidly than their ancestors. Further work has hinted that this capacity is enabled by gene amplification, but other mechanisms may ...
openaire +2 more sources
Breakpoint Clusters: Reason or Consequence?
Critical Reviews in Eukaryotic Gene Expression, 2004Chromosomal rearrangements are common causes of cancer. In the majority of cases, the malignancy is induced via an altered transcription factor. The breakpoints of such translocations are often mysteriously tightly clustered in the genome. Even more surprisingly, such breakpoint clusters often contain specific genomic elements, such as topoisomerase II
Andrey A. Bystritskiy, Sergey V. Razin
openaire +3 more sources
Journal AWWA, 1951
Among other bactericidal agents used in treating water, bromine is sometimes mentioned. Although there are no known applications of bromine to public water supplies, it is finding occasional and increasing use in swimming' pools and industrial water supplies. Because the chemical is used in water conditioning, it was considered desirable to explore its
openaire +2 more sources
Among other bactericidal agents used in treating water, bromine is sometimes mentioned. Although there are no known applications of bromine to public water supplies, it is finding occasional and increasing use in swimming' pools and industrial water supplies. Because the chemical is used in water conditioning, it was considered desirable to explore its
openaire +2 more sources
Sublocalization of the breakpoints of a t(5;16) in myelodysplasia
Cancer Genetics and Cytogenetics, 1998As a first step in characterizing a t(5;16)(q31;p11.2) in a patient with the diagnosis refractory anemia with ring sideroblasts, a cell fusion was carried out between bone marrow cells from the patient and the Chinese hamster cell line A3. Using PCR and FISH analysis on hybrid lines containing the human derivative 16 chromosome, the breakpoints could ...
Soest, R.A.+7 more
openaire +4 more sources