Sciweavers

2584 search results - page 392 / 517
» On the Forward Checking Algorithm
Sort
View
ENTCS
2006
124views more  ENTCS 2006»
14 years 10 months ago
An Efficient Nelson-Oppen Decision Procedure for Difference Constraints over Rationals
Abstract. Nelson and Oppen provided a methodology for modularly combining decision procedures for individual theories to construct a decision procedure for a combination of theorie...
Shuvendu K. Lahiri, Madanlal Musuvathi
MTA
2002
195views more  MTA 2002»
14 years 9 months ago
Shot Partitioning Based Recognition of TV Commercials
Digital video applications exploit the intrinsic structure of video sequences. In order to obtain and represent this structure for video annotation and indexing tasks, the main ini...
Juan María Sánchez, Xavier Binefa, J...
ICTAC
2010
Springer
14 years 8 months ago
Scalable Distributed Concolic Testing: A Case Study on a Flash Storage Platform
Flash memory has become a virtually indispensable component for mobile devices in today’s information society. However, conventional testing methods often fail to detect hidden b...
Yunho Kim, Moonzoo Kim, Nam Dang
FDTC
2010
Springer
138views Cryptology» more  FDTC 2010»
14 years 8 months ago
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
Many implementations of cryptographic algorithms have shown to be susceptible to fault attacks. For some of them, countermeasures against specific fault models have been proposed. ...
Marcel Medwed, Jörn-Marc Schmidt
PPOPP
2009
ACM
15 years 10 months ago
Idempotent work stealing
Load balancing is a technique which allows efficient parallelization of irregular workloads, and a key component of many applications and parallelizing runtimes. Work-stealing is ...
Maged M. Michael, Martin T. Vechev, Vijay A. Saras...