Sciweavers

1518 search results - page 142 / 304
» Cryptographic Test Correction
Sort
View
PLDI
2009
ACM
16 years 4 months ago
A decision procedure for subset constraints over regular languages
Reasoning about string variables, in particular program inputs, is an important aspect of many program analyses and testing frameworks. Program inputs invariably arrive as strings...
Pieter Hooimeijer, Westley Weimer
102
Voted
SAC
2009
ACM
15 years 10 months ago
Specifying and checking protocols of multithreaded classes
In the Design By Contract (DBC) approach, programmers specify methods with pre and postconditions (also called contracts). Earlier work added protocols to the DBC approach to desc...
Clément Hurlin
SC
2009
ACM
15 years 10 months ago
Flexible cache error protection using an ECC FIFO
We present ECC FIFO, a mechanism enabling two-tiered last-level cache error protection using an arbitrarily strong tier-2 code without increasing on-chip storage. Instead of addin...
Doe Hyun Yoon, Mattan Erez
ICDAR
2009
IEEE
15 years 10 months ago
Scaling Up Whole-Book Recognition
We describe the results of large-scale experiments with algorithms for unsupervised improvement of recognition of book-images using fully automatic mutual-entropy-based model adap...
Pingping Xiu, Henry S. Baird
ESAW
2009
Springer
15 years 10 months ago
Cooperative Sign Language Tutoring: A Multiagent Approach
Sign languages can be learned effectively only with frequent feedback from an expert in the field. The expert needs to watch a performed sign, and decide whether the sign has bee...
Ilker Yildirim, Oya Aran, Pinar Yolum, Lale Akarun