Sciweavers

4722 search results - page 708 / 945
» Encoding Program Executions
Sort
View
TC
1998
15 years 2 months ago
An Efficient Solution to the Cache Thrashing Problem Caused by True Data Sharing
—When parallel programs are executed on multiprocessors with private caches, a set of data may be repeatedly used and modified by different threads. Such data sharing can often r...
Guohua Jin, Zhiyuan Li, Fujie Chen
TSMC
1998
62views more  TSMC 1998»
15 years 2 months ago
Performance based design of high-level language-directed computer architectures
— This paper is concerned with the analytical modeling of computer architectures to aid in the design of high-level language-directed computer architectures. High-level language-...
Rajendra S. Katti, Mark L. Manwaring
SQJ
2002
90views more  SQJ 2002»
15 years 2 months ago
Critical Analysis of the PIE Testability Technique
Abstract. The work of Voas and colleagues has introduced, refined and applied the propagation, infection and execution (PIE) analysis technique for measuring testability of program...
Zuhoor A. Al-Khanjari, Martin R. Woodward, Haider ...
ICRA
2010
IEEE
137views Robotics» more  ICRA 2010»
15 years 1 months ago
Assembling wheels to continuously conveyed car bodies using a standard industrial robot
Abstract— Within assembly lines, wheel assembly to continuously conveyed car bodies is still executed by human workers using a device that compensates the weight of the wheel. Th...
Friedrich Lange, Jochen Werner, Johannes Scharrer,...
IJISEC
2010
121views more  IJISEC 2010»
15 years 1 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes