41,439 Hits in 2.0 sec

It's Doomed; We Can Prove It [chapter]

Jochen Hoenicke, K. Rustan M. Leino, Andreas Podelski, Martin Schäf, Thomas Wies
2009 Lecture Notes in Computer Science  
A program fragment is doomed if its execution will inevitably fail, in whatever state it is started.  ...  Programming errors found early are the cheapest.  ...  Proposition 1 . 1 For any program P , the set of doomed program points of program Transform(P ) is a subset of the doomed program points of program P .  ... 
doi:10.1007/978-3-642-05089-3_22 fatcat:kcgyczm4cnddvmq7u67urx4ove

Computer games as interfaces

Dennis L. Chao
2004 Interactions  
I added code to create one monster in the Doom environment for each program running on the user's computer.  ...  In 1999, Id Software released Doom's source code, making it easy for me to turn Doom into the program manager PSDoom.  ... 
doi:10.1145/1015530.1015567 fatcat:zadwcymyfbernj5lhngbr565wq

Diagnosing Abstraction Failure for Separation Logic–Based Analyses [chapter]

Josh Berdine, Arlen Cox, Samin Ishtiaq, Christoph M. Wintersteiger
2012 Lecture Notes in Computer Science  
A subsequent diagnosis finds discontinuities on infeasible traces, and identifies doomed states admitted by the abstraction.  ...  Application of this technique in shape analyses has proved impractical as core components of existing refinement techniques such as backward analysis, general conjunction, and identification of unreachable but doomed  ...  If this new abstract counter-example is feasible, then the program point under consideration contains a discontinuity, and the generated state is doomed.  ... 
doi:10.1007/978-3-642-31424-7_16 fatcat:zmat27hfpje43mcpxpf35jkavm

Severity Levels of Inconsistent Code [chapter]

Martin Schäf, Ashish Tiwari
2015 Lecture Notes in Computer Science  
The term inconsistent code is used by [2, 10, 18] , in other papers, the same phenomenon is called doomed program points [10] , or deviant behavior [7] .  ...  We do not discuss this last point in this paper.  ... 
doi:10.1007/978-3-319-24953-7_8 fatcat:atzakmq5b5ee5ivxoqtrzwz22q

High-performance play: The making of machinima

Henry Lowood
2006 Journal of Media Practice  
In this phase, DOOM and especially Quake movie makers created practices of game performance and high-performance technology that yielded a new medium for linear storytelling and artistic expression.  ...  As BahdKo, a veteran of the DOOM demo scene points out, "Use of demos for their educational value has been going on since almost the beginning."  ...  Beginning in 1994, the Doom Honorific Title (DHT) Program, a game rating system, became "the means by which good players can objectively prove to the world that they are as good as they claim."  ... 
doi:10.1386/jmpr.7.1.25/1 fatcat:db52w5xbgfcthmu7iv2dnk6rhq

Genesis and Evolution of an Undergraduate Mechatronics Course

Thomas Kurfess, William Singhose, Joel Fortgang
2002 IFAC Proceedings Volumes  
However, in addition to the fundamental design curriculum, the students must also learn basic mechatronic concepts such as programming and electronics.  ...  Doom was accessed a 10 point deduction. Mt.  ...  A device received 1 point for placing a ring in Mordor, 3 points for placing a ring in the shadow of Mt. Doom, and 15 points if it managed to place a ring inside Mt. Doom.  ... 
doi:10.1016/s1474-6670(17)34008-9 fatcat:btbtbswd6nbhlk5luppwljil7a

Ordering-Based Semantics for Software Transactional Memory [chapter]

Michael F. Spear, Luke Dalessandro, Virendra J. Marathe, Michael L. Scott
2008 Lecture Notes in Computer Science  
Phased Privatization In some applications, program structure, such as barriers and thread join points, ensures that all threads agree that a datum is public or private [16] .  ...  At this point, all privatization mechanisms risk waiting for a preempted transaction to resume.  ... 
doi:10.1007/978-3-540-92221-6_19 fatcat:2axdukw7m5hexeubupccwh6faa

ViZDoom: A Doom-based AI Research Platform for Visual Reinforcement Learning [article]

Michał Kempka, Marek Wydmuch, Grzegorz Runc, Jakub Toczek and Wojciech Jaśkowski
2016 arXiv   pre-print
The software, called ViZDoom, is based on the classical first-person shooter video game, Doom. It allows developing bots that play the game using the screen buffer.  ...  It scores 1 point for each tick, and it is punished by −100 points for dying. Thus, it is motivated to survive as long as possible.  ...  Application Programming Interface (API) ViZDoom API is flexible and easy-to-use.  ... 
arXiv:1605.02097v2 fatcat:hsxn5ozjazasthaoe3bhaslwn4

Finding bugs in eclipse

William W. Pugh
2007 Companion to the 22nd ACM SIGPLAN conference on Object oriented programming systems and applications companion - OOPSLA '07  
programming errors in Java programs.  ...  Selected correctness issues found in Eclipse Null pointer dereference 139 Reverse null point dereference 70 Doomed equals 31 Non short circuit evaluation 25 Dubious method invocation 15 Self  ... 
doi:10.1145/1297846.1297924 dblp:conf/oopsla/Pugh07 fatcat:vfnsnzrxtbe6lgbit5iy3z2v5m

Special issue: 2nd World Congress on Formal Methods

Ana Cavalcanti, Dennis Dams
2010 Formal methods in system design  
Doomed Program Points (by Jochen Hoenicke, Rustan Leino, Andreas Podelski, Martin Schaef, and Thomas Wies) defines the notion of a doomed source code fragment to be one whose execution will fail regardless  ...  Anautomated verification method is developed that can identify doomed program fragments and without reporting false positives. Experiments are then described using a prototype implementation.  ... 
doi:10.1007/s10703-011-0113-5 fatcat:x67tgz3uq5aodgvape3ftblwwe

Book Review: Heidi Blake, From Russia with Blood: The Kremlin's Ruthless Assassination Program and Vladimir Putin's Secret War on the West. New York: Mulholland Books, 2019

Aaron J. Cuevas
2020 New Trends in Social and Liberal Sciences  
economic liberalism over communism and the doomed command economic model.  ...  In the years following the end of the Cold War and the collapse of the Soviet Union, Western leaders and political scientists lauded the turning point in history as a momentous triumph of democracy and  ...  economic liberalism over communism and the doomed command economic model.  ... 
doi:10.24819/netsol2020.08 fatcat:tpzqitrpjjgbnde3hmdwmvb3ce

Computer Recreations

A. K. Dewdney
1985 Scientific American  
By the same token, information directed by the ROGUE program to the screen is also directed toward the ROG O-MATIC program so that it can keep its own map of the Dungeons of Doom.  ...  The ROG-O-MA TIC program consists of 12,000 lines of the programming language C; it is even longer and' more complicated than the ROGUE program.  ... 
doi:10.1038/scientificamerican0285-18 fatcat:7stjysah35aenjteaxzfcsxncq

Page 14 of Canadian Personnel and Industrial Relations Journal Vol. 24, Issue 4 [page]

1977 Canadian Personnel and Industrial Relations Journal  
is doomed to failure.  ...  Kerwin emphasized that a crucial point in this instance (as indeed in all instances) was the leading role of the union; if the union is unwilling to co-operate and make unusual allowances any such program  ... 

Privatization techniques for software transactional memory

Michael F. Spear, Virendra J. Marathe, Luke Dalessandro, Michael L. Scott
2007 Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing - PODC '07  
Memory may appear inconsistent in programs that violate this assumption, even when program logic would seem to make extra-transactional accesses safe.  ...  that privatization comprises a pair of symmetric subproblems: private operations may fail to see updates made by transactions that have committed but not yet completed; conversely, transactions that are doomed  ...  That is, program logic must partition objects, at each point in time, into those that are shared, with access mediated by transactions, and those that are private to some thread. 1 The privatization  ... 
doi:10.1145/1281100.1281161 dblp:conf/podc/SpearMDS07 fatcat:esdwwtlnlvdrxjtfygkbxzqm3i

Inferring Synchronization under Limited Observability [chapter]

Martin Vechev, Eran Yahav, Greta Yorsh
2009 Lecture Notes in Computer Science  
This paper addresses the problem of automatically inferring synchronization for concurrent programs.  ...  We implemented a prototype of our approach and applied it to infer synchronization in a number of small programs.  ...  The starting point of the algorithm is the transition system of Fig. 2 .  ... 
doi:10.1007/978-3-642-00768-2_13 fatcat:bamd5oj62vdnvhjkx44a6lzjmm
« Previous Showing results 1 — 15 out of 41,439 results