Sciweavers

4305 search results - page 527 / 861
» Analysing Protocol Implementations
Sort
View
INFOCOM
2012
IEEE
13 years 7 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...
OSDI
2002
ACM
16 years 5 months ago
CMC: A Pragmatic Approach to Model Checking Real Code
Many system errors do not emerge unless some intricate sequence of events occurs. In practice, this means that most systems have errors that only trigger after days or weeks of ex...
Madanlal Musuvathi, David Y. W. Park, Andy Chou, D...
MICRO
2009
IEEE
132views Hardware» more  MICRO 2009»
15 years 11 months ago
EazyHTM: eager-lazy hardware transactional memory
Transactional Memory aims to provide a programming model that makes parallel programming easier. Hardware implementations of transactional memory (HTM) suffer from fewer overhead...
Sasa Tomic, Cristian Perfumo, Chinmay Eishan Kulka...
144
Voted
CVPR
2007
IEEE
16 years 7 months ago
Constrained Optimization for Retinal Curvature Estimation Using an Affine Camera
We study retinal curvature estimation from multiple images that provides the fundamental geometry of human retina. We use an affine camera model due to its simplicity, linearity, ...
Thitiporn Chanwimaluang, Guoliang Fan
DAC
2002
ACM
16 years 6 months ago
High-Level specification and automatic generation of IP interface monitors
A central problem in functional verification is to check that a circuit block is producing correct outputs while enforcing that the environment is providing legal inputs. To attac...
Marcio T. Oliveira, Alan J. Hu