Sciweavers

1518 search results - page 206 / 304
» Cryptographic Test Correction
Sort
View
81
Voted
PERCOM
2007
ACM
16 years 9 days ago
The SkyLoc Floor Localization System
When a mobile user dials 911, a key to arriving to the emergency scene promptly is knowing the location of the mobile user. This paper presents SkyLoc, a GSM fingerprinting-based ...
Alex Varshavsky, Anthony LaMarca, Jeffrey Hightowe...
POPL
2010
ACM
15 years 10 months ago
A simple, verified validator for software pipelining
Software pipelining is a loop optimization that overlaps the execution of several iterations of a loop to expose more instruction-level parallelism. It can result in first-class p...
Jean-Baptiste Tristan, Xavier Leroy
103
Voted
ICCD
2007
IEEE
125views Hardware» more  ICCD 2007»
15 years 9 months ago
Low-cost run-time diagnosis of hard delay faults in the functional units of a microprocessor
This paper addresses the run-time diagnosis of delay faults in functional units of microprocessors. Despite the popularity of the stuck-at fault model, it is no longer the only re...
Sule Ozev, Daniel J. Sorin, Mahmut Yilmaz
92
Voted
ASPLOS
2010
ACM
15 years 7 months ago
Specifying and dynamically verifying address translation-aware memory consistency
Computer systems with virtual memory are susceptible to design bugs and runtime faults in their address translation (AT) systems. Detecting bugs and faults requires a clear speciï...
Bogdan F. Romanescu, Alvin R. Lebeck, Daniel J. So...
99
Voted
TEI
2010
ACM
199views Hardware» more  TEI 2010»
15 years 7 months ago
Revealing the invisible: visualizing the location and event flow of distributed physical devices
Distributed physical user interfaces comprise networked sensors, actuators and other devices attached to a variety of computers in different locations. Developing such systems is ...
Nicolai Marquardt, Tom Gross, M. Sheelagh T. Carpe...