Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
We consider distributed real-time systems where concurrency control is managed using software transactional memory. For such a method we propose an algorithm to compute an upper b...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...
Abstract. Vessels supplying malignant tumors are abnormally shaped. This paper describes a blinded study that assessed tumor malignancy by analyzing vessel shape within MR images o...
Elizabeth Bullitt, Inkyung Jung, Keith E. Muller, ...
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
—Modern sliding table saws are equipped with several passive safety devices. However, alone in Germany several hundred severe injuries or limb amputations occur each year due dis...