Sciweavers

505 search results - page 95 / 101
» Implementation of Belief Change Operators Using BDDs
Sort
View
146
Voted
CCS
2011
ACM
14 years 1 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
POPL
2009
ACM
16 years 2 months ago
State-dependent representation independence
Mitchell's notion of representation independence is a particularly useful application of Reynolds' relational parametricity -- two different implementations of an abstra...
Amal Ahmed, Derek Dreyer, Andreas Rossberg
MICRO
2009
IEEE
168views Hardware» more  MICRO 2009»
15 years 8 months ago
Ordering decoupled metadata accesses in multiprocessors
Hardware support for dynamic analysis can minimize the performance overhead of useful applications such as security checks, debugging, and profiling. To eliminate implementation ...
Hari Kannan
99
Voted
CF
2009
ACM
15 years 8 months ago
Scheduling dynamic parallelism on accelerators
Resource management on accelerator based systems is complicated by the disjoint nature of the main CPU and accelerator, which involves separate memory hierarhcies, different degr...
Filip Blagojevic, Costin Iancu, Katherine A. Yelic...
118
Voted
ICRA
2006
IEEE
123views Robotics» more  ICRA 2006»
15 years 7 months ago
Simultaneous Localization and Mapping with Environmental Structure Prediction
—Traditionally, simultaneous localization and mapping (SLAM) algorithms solve the localization and mapping problem in explored regions. This paper presents a prediction-based SLA...
H. Jacky Chang, C. S. George Lee, Yung-Hsiang Lu, ...