Sciweavers

388 search results - page 56 / 78
» Program Analysis Using Symbolic Ranges
Sort
View
ICCAD
2008
IEEE
153views Hardware» more  ICCAD 2008»
15 years 6 months ago
SPM management using Markov chain based data access prediction
— Leveraging the power of scratchpad memories (SPMs) available in most embedded systems today is crucial to extract maximum performance from application programs. While regular a...
Taylan Yemliha, Shekhar Srikantaiah, Mahmut T. Kan...
101
Voted
ICDAR
2009
IEEE
14 years 7 months ago
PENTOOLS - A MATLAB Toolkit for On-line Pen-Based Data Experimentation
MATLAB provides a powerful environment for rapid prototyping of research methods and techniques. Across the wide range of on-line pen computing applications there exists a series ...
Richard M. Guest
107
Voted
WCRE
2002
IEEE
15 years 2 months ago
Estimating Potential Parallelism for Platform Retargeting
Scientific, symbolic, and multimedia applications present diverse computing workloads with different types of inherent parallelism. Tomorrow’s processors will employ varying com...
Linda M. Wills, Tarek M. Taha, Lewis B. Baumstark ...
AMAI
2007
Springer
14 years 9 months ago
Decision procedures for extensions of the theory of arrays
The theory of arrays, introduced by McCarthy in his seminal paper “Toward a mathematical science of computation”, is central to Computer Science. Unfortunately, the theory alo...
Silvio Ghilardi, Enrica Nicolini, Silvio Ranise, D...
105
Voted
SEKE
2010
Springer
14 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li