Some programs are doubly-generic. For example, map is datatypegeneric in that many different data structures support a mapping operation. A generic programming language like Gener...
ā Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
Computer systems with virtual memory are susceptible to design bugs and runtime faults in their address translation (AT) systems. Detecting bugs and faults requires a clear speciļ...
Bogdan F. Romanescu, Alvin R. Lebeck, Daniel J. So...
āPower has recently been recognized as one of the major obstacles in ļ¬elding a Peta-FLOPs class system. To reach Exa-FLOPs, the challenge will certainly be compounded. In this ...
James H. Laros, Kevin T. Pedretti, Suzanne M. Kell...
āConstraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are speciļ¬ed in the pol...