Sciweavers

1411 search results - page 117 / 283
» A Value Analysis for C Programs
Sort
View
ASPLOS
2008
ACM
15 years 6 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
SAC
2009
ACM
15 years 11 months ago
Response time analysis of software transactional memory-based distributed real-time systems
We consider distributed real-time systems where concurrency control is managed using software transactional memory. For such a method we propose an algorithm to compute an upper b...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...
MICCAI
2004
Springer
15 years 9 months ago
Determining Malignancy of Brain Tumors by Analysis of Vessel Shape
Abstract. Vessels supplying malignant tumors are abnormally shaped. This paper describes a blinded study that assessed tumor malignancy by analyzing vessel shape within MR images o...
Elizabeth Bullitt, Inkyung Jung, Keith E. Muller, ...
CCS
1998
ACM
15 years 8 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
WCE
2007
15 years 5 months ago
Information Fusion for Hazard Analysis in Multi-Sensor Systems based on Bayesian Networks
—Modern sliding table saws are equipped with several passive safety devices. However, alone in Germany several hundred severe injuries or limb amputations occur each year due dis...
Jörg Barrho, Johannes Hauger, Uwe Kiencke