Sciweavers

1411 search results - page 173 / 283
» A Value Analysis for C Programs
Sort
View
LCTRTS
2010
Springer
15 years 9 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
ESOP
2001
Springer
15 years 9 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
DAC
2007
ACM
16 years 5 months ago
Parameter Finding Methods for Oscillators with a Specified Oscillation Frequency
This paper presents a generalized formulation of the periodic steady-state analysis for oscillators. The new formulation finds the value of a circuit parameter that results in a d...
Igor Vytyaz, David C. Lee, Suihua Lu, Amit Mehrotr...
120
Voted
HICSS
2006
IEEE
107views Biometrics» more  HICSS 2006»
15 years 11 months ago
Developing an Online Business Community: A Travel Industry Case Study
Many businesses are now using online communities to interact with their customers and to realise the many benefits such communities offer. However, there remains little understand...
Rosemary Stockdale, Michael C. A. Borovicka
114
Voted
ACIVS
2006
Springer
15 years 11 months ago
Dilation Matrices for Nonseparable Bidimensional Wavelets
Abstract. For nonseparable bidimensional wavelet transforms, the choice of the dilation matrix is all–important, since it governs the downsampling and upsampling steps, determine...
Ana M. C. Ruedin