Sciweavers

2500 search results - page 298 / 500
» Specifying Behavior in C
Sort
View
160
Voted
PLDI
2011
ACM
14 years 6 months ago
Evaluating value-graph translation validation for LLVM
Translation validators are static analyzers that attempt to verify that program transformations preserve semantics. Normalizing translation validators do so by trying to match the...
Jean-Baptiste Tristan, Paul Govereau, Greg Morrise...
CSFW
2011
IEEE
14 years 3 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
TOG
2012
181views Communications» more  TOG 2012»
13 years 6 months ago
Soft body locomotion
We present a physically-based system to simulate and control the locomotion of soft body characters without skeletons. We use the finite element method to simulate the deformatio...
Jie Tan, Greg Turk, C. Karen Liu
DAC
2007
ACM
16 years 5 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
132
Voted
IPMI
1999
Springer
16 years 4 months ago
MEG Source Imaging Using Multipolar Expansions
We describe the use of truncated multipolar expansions for producing dynamic images of cortical neural activation from measurements of the magnetoencephalogram. We use a signal-sub...
John C. Mosher, Richard M. Leahy, David W. Shattuc...