Sciweavers

1076 search results - page 128 / 216
» Operations on proofs and labels
Sort
View
99
Voted
CAV
2009
Springer
165views Hardware» more  CAV 2009»
15 years 4 months ago
Equivalence Checking of Static Affine Programs Using Widening to Handle Recurrences
Designers often apply manual or semi-automatic loop and data transformations on array and loop intensive programs to improve performance. The transformations should preserve the fu...
Sven Verdoolaege, Gerda Janssens, Maurice Bruynoog...
95
Voted
DEXAW
2004
IEEE
124views Database» more  DEXAW 2004»
15 years 4 months ago
PAC-MEN: Personal Autonomic Computing Monitoring Environment
The overall goal of this research is to improve the `environment awareness' aspect of personal autonomic computing. Personal Computing offers unique challenges for self-manag...
Roy Sterritt, David F. Bantz
AFRIGRAPH
2001
ACM
15 years 4 months ago
Exploiting coherence of shadow rays
We present independent method to reduce the number of shadow ray tests. It can be used with standard acceleration ray tracing algorithms. Our method is conservative and produces t...
Andrzej Lukaszewski
ESORICS
2000
Springer
15 years 4 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
110
Voted
PPDP
2000
Springer
15 years 4 months ago
A model for comparing the space usage of lazy evaluators
Identifying the source of space faults in functional programs is hard. The problem is compoundedas space usage can vary enormously from one implementation to another. We use a ter...
Adam Bakewell, Colin Runciman