Sciweavers

3323 search results - page 617 / 665
» Computational Semantics with Functional Programming
Sort
View
ISCA
2012
IEEE
224views Hardware» more  ISCA 2012»
13 years 3 days ago
A first-order mechanistic model for architectural vulnerability factor
Soft error reliability has become a first-order design criterion for modern microprocessors. Architectural Vulnerability Factor (AVF) modeling is often used to capture the probab...
Arun A. Nair, Stijn Eyerman, Lieven Eeckhout, Lizy...
CVPR
2010
IEEE
15 years 5 months ago
Tag-based Web Photo Retrieval Improved by Batch Mode Re-Tagging
Web photos in social media sharing websites such as Flickr are generally accompanied by rich but noisy textual descriptions (tags, captions, categories, etc.). In this paper, we p...
Lin Chen, Dong Xu, Wai-Hung Tsang, Jiebo Luo
CSFW
2008
IEEE
15 years 4 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
SPIN
2005
Springer
15 years 3 months ago
Behavioural Models for Hierarchical Components
We describe a method for the specification and verification of the dynamic behaviour of component systems. Building applications using a component framework allows the developers...
Tomás Barros, Ludovic Henrio, Eric Madelain...
IPPS
2003
IEEE
15 years 3 months ago
Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modu...
Tatiana Kichkaylo, Anca-Andreea Ivan, Vijay Karamc...