Sciweavers

861 search results - page 149 / 173
» Symbolic Program Analysis Using Term Rewriting and Generaliz...
Sort
View
ICMI
2003
Springer
133views Biometrics» more  ICMI 2003»
15 years 5 months ago
Mouthbrush: drawing and painting by hand and mouth
We present a novel multimodal interface which permits users to draw or paint using coordinated gestures of hand and mouth. A headworn camera captures an image of the mouth and the...
Chi-Ho Chan, Michael J. Lyons, Nobuji Tetsutani
CCS
2008
ACM
15 years 1 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ASPLOS
2010
ACM
15 years 6 months ago
Virtualized and flexible ECC for main memory
We present a general scheme for virtualizing main memory errorcorrection mechanisms, which map redundant information needed to correct errors into the memory namespace itself. We ...
Doe Hyun Yoon, Mattan Erez
PLDI
2010
ACM
15 years 4 months ago
A GPGPU compiler for memory optimization and parallelism management
This paper presents a novel optimizing compiler for general purpose computation on graphics processing units (GPGPU). It addresses two major challenges of developing high performa...
Yi Yang, Ping Xiang, Jingfei Kong, Huiyang Zhou
SIGSOFT
2007
ACM
16 years 14 days ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek