Sciweavers

7139 search results - page 1390 / 1428
» Language Engineering in Practice
Sort
View
147
Voted
DATE
2004
IEEE
119views Hardware» more  DATE 2004»
15 years 7 months ago
MINCE: Matching INstructions Using Combinational Equivalence for Extensible Processor
Designing custom-extensible instructions for Extensible Processors1 is a computationally complex task because of the large design space. The task of automatically matching candida...
Newton Cheung, Sri Parameswaran, Jörg Henkel,...
131
Voted
CSL
2006
Springer
15 years 7 months ago
Nonmonotonic Logics and Their Algebraic Foundations
The goal of this note is to provide a background and references for the invited lecture presented at Computer Science Logic 2006. We briefly discuss motivations that led to the eme...
Miroslaw Truszczynski
125
Voted
SPAA
1997
ACM
15 years 7 months ago
Efficient Detection of Determinacy Races in Cilk Programs
A parallel multithreaded program that is ostensibly deterministic may nevertheless behave nondeterministically due to bugs in the code. These bugs are called determinacy races, an...
Mingdong Feng, Charles E. Leiserson
140
Voted
DRR
2010
15 years 6 months ago
Biomedical article retrieval using multimodal features and image annotations in region-based CBIR
Biomedical images are invaluable in establishing diagnosis, acquiring technical skills, and implementing best practices in many areas of medicine. At present, images needed for in...
Daekeun You, Sameer Antani, Dina Demner-Fushman, M...
131
Voted
USS
2008
15 years 6 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
« Prev « First page 1390 / 1428 Last » Next »