Sciweavers

7167 search results - page 1092 / 1434
» Answer Set Programming
Sort
View
ISCA
1998
IEEE
123views Hardware» more  ISCA 1998»
15 years 7 months ago
Weak Ordering - A New Definition
A memory model for a shared memory, multiprocessor commonly and often implicitly assumed by programmers is that of sequential consistency. This model guarantees that all memory ac...
Sarita V. Adve, Mark D. Hill
ISCA
1998
IEEE
143views Hardware» more  ISCA 1998»
15 years 7 months ago
Lockup-Free Instruction Fetch/Prefetch Cache Organization
In the past decade. there has been much literature describing various cache organizatrons that exploit general programming idiosyncrasies to obtain maxrmum hit rate (the probabili...
David Kroft
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 7 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICCAD
1996
IEEE
141views Hardware» more  ICCAD 1996»
15 years 7 months ago
An observability-based code coverage metric for functional simulation
Functional simulation is the most widely used method for design verification. At various levels of abstraction, e.g., behavioral, register-transfer level and gate level, the design...
Srinivas Devadas, Abhijit Ghosh, Kurt Keutzer
ICECCS
1996
IEEE
209views Hardware» more  ICECCS 1996»
15 years 7 months ago
Coupling-based Integration Testing
This research is part of a project to develop practical, effective, formalizable, automatable techniques for integration testing. Integration testing is an important part of the t...
Zhenyi Jin, A. Jefferson Offutt
« Prev « First page 1092 / 1434 Last » Next »