Sciweavers

452 search results - page 31 / 91
» Symbolic Execution of Behavioral Requirements
Sort
View
CHI
2011
ACM
14 years 2 months ago
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...
78
Voted
ISCA
2002
IEEE
102views Hardware» more  ISCA 2002»
15 years 3 months ago
Implementing Optimizations at Decode Time
The number of pipeline stages separating dynamic instruction scheduling from instruction execution has increased considerably in recent out-of-order microprocessor implementations...
Ilhyun Kim, Mikko H. Lipasti
99
Voted
IPPS
1998
IEEE
15 years 3 months ago
Processor Lower Bound Formulas for Array Computations and Parametric Diophantine Systems
Using a directed acyclic graph (dag) model of algorithms, we solve a problem related to precedenceconstrained multiprocessor schedules for array computations: Given a sequence of ...
Peter R. Cappello, Ömer Egecioglu
PSLS
1995
15 years 2 months ago
Lazy Remote Procedure Call and its Implementation in a Parallel Variant of C
Abstract. Lazy task creation (LTC) is an e cient approach for executing divide and conquer parallel programs that has been used in the implementation of Multilisp's future con...
Marc Feeley
WSC
1997
15 years 7 days ago
A Conceptual Activity Cycle-Based Simulation Modeling Method
This paper studies activity cycle diagrams (ACD) for modeling construction processes using activities as the basic elements. An ACD is obtained by combining the activity cycles of...
Jingsheng Shi