Sciweavers

1579 search results - page 287 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
MICRO
2010
IEEE
161views Hardware» more  MICRO 2010»
14 years 7 months ago
AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection
A particularly insidious type of concurrency bug is atomicity violations. While there has been substantial work on automatic detection of atomicity violations, each existing techn...
Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas
CODES
2010
IEEE
14 years 7 months ago
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
This paper describes PowerBooter, an automated power model construction technique that uses built-in battery voltage sensors and knowledge of battery discharge behavior to monitor...
Lide Zhang, Birjodh Tiwana, Zhiyun Qian, Zhaoguang...
ECCV
2000
Springer
15 years 11 months ago
Model-Based Initialisation for Segmentation
The initialisation of segmentation methods aiming at the localisation of biological structures in medical imagery is frequently regarded as a given precondition. In practice, howev...
Christian Brechbühler, Gábor Szé...
171
Voted
POPL
2009
ACM
15 years 10 months ago
The theory of deadlock avoidance via discrete control
Deadlock in multithreaded programs is an increasingly important problem as ubiquitous multicore architectures force parallelization upon an ever wider range of software. This pape...
Manjunath Kudlur, Scott A. Mahlke, Stéphane...
POPL
2008
ACM
15 years 10 months ago
Engineering formal metatheory
Machine-checked proofs of properties of programming languages have become a critical need, both for increased confidence in large and complex designs and as a foundation for techn...
Arthur Charguéraud, Benjamin C. Pierce, Bri...