Sciweavers

2513 search results - page 316 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
90
Voted
HIPEAC
2010
Springer
15 years 2 months ago
Offload - Automating Code Migration to Heterogeneous Multicore Systems
We present Offload, a programming model for offloading parts of a C++ application to run on accelerator cores in a heterogeneous multicore system. Code to be offloaded is enclosed ...
Pete Cooper, Uwe Dolinsky, Alastair F. Donaldson, ...
ISSTA
2010
ACM
15 years 2 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
78
Voted
LREC
2010
188views Education» more  LREC 2010»
15 years 2 months ago
Example-Based Automatic Phonetic Transcription
Current state-of-the-art systems for automatic phonetic transcription (APT) are mostly phone recognizers based on Hidden Markov models (HMMs). We present a different approach for ...
Christina Leitner, Martin Schickbichler, Stefan Pe...
97
Voted
SIMUTOOLS
2008
15 years 2 months ago
Real-time emulation of networked robot systems
In this paper we present a methodology for the evaluation of networked systems communicating using WLAN technology. We show a case study of goal-oriented cooperating robots, for w...
Razvan Beuran, Junya Nakata, Takashi Okada, Yasuo ...
89
Voted
TNC
2004
103views Education» more  TNC 2004»
15 years 2 months ago
Roaming Network Access Using Shibboleth
There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. Thes...
Mikael Linden, Viljo Viitanen