Sciweavers

170 search results - page 19 / 34
» Constructing Small-Bias Sets from Algebraic-Geometric Codes
Sort
View
70
Voted
ACSD
2005
IEEE
121views Hardware» more  ACSD 2005»
15 years 5 months ago
LusSy: A Toolbox for the Analysis of Systems-on-a-Chip at the Transactional Level
We describe a toolbox for the analysis of Systems-on-achip described in SystemC at the transactional level. The tools are able to extract information from SystemC code, and to bui...
Matthieu Moy, Florence Maraninchi, Laurent Maillet...
MICRO
2010
IEEE
161views Hardware» more  MICRO 2010»
14 years 9 months ago
AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection
A particularly insidious type of concurrency bug is atomicity violations. While there has been substantial work on automatic detection of atomicity violations, each existing techn...
Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas
VISSOFT
2005
IEEE
15 years 5 months ago
Interactive Exploration of UML Sequence Diagrams
Sequence diagrams are commonly used to represent object interactions in software systems. Reverse-engineered sequence diagrams, which are constructed from existing code, are becom...
Richard Sharp, Atanas Rountev
ENTCS
2002
114views more  ENTCS 2002»
14 years 11 months ago
Adjunction Models For Call-By-Push-Value With Stacks
Call-by-push-value is a "semantic machine code", providing a set of simple primitives from which both the call-by-value and call-by-name paradigms are built. We present i...
Paul Blain Levy
POPL
2001
ACM
16 years 1 days ago
Oracle-based checking of untrusted software
We present a variant of Proof-Carrying Code (PCC) in which the trusted inference rules are represented as a higher-order logic program, the proof checker is replaced by a nondeter...
George C. Necula, Shree Prakash Rahul