Pre-execution attacks cache misses for which conventional address-prediction driven prefetching is ineffective. In pre-execution, copies of cache miss computations are isolated fr...
Abstract. We present automated techniques for the explanation of counterexamples, where a counter-example should be understood as a sequence of program statements. Our approach is ...
— By analyzing people’s contact patterns over time, it is possible to build efficient delay tolerant networking (DTN) algorithms and derive important data for parameterizing an...
Mohammad S. Hashemian, Kevin G. Stanley, Nathaniel...
CT colonography (CTC) is a rapidly evolving technique to screen for colorectal polyps. Fecal residue may occlude or, reversely, mimic polyps. Electronic cleansing aims at removing...
Vincent Frans van Ravesteijn, Frans M. Vos, Iwo Se...
The past decades have witnessed a rapid growth of Distributed Interactive Multimedia Environments (DIMEs). Despite their intensity of user-involved interaction, the existing evalu...