Sciweavers

4911 search results - page 549 / 983
» Tree dependence analysis
Sort
View
CCS
2001
ACM
15 years 9 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
ICS
1999
Tsinghua U.
15 years 9 months ago
Improving the performance of speculatively parallel applications on the Hydra CMP
Hydra is a chip multiprocessor (CMP) with integrated support for thread-level speculation. Thread-level speculation provides a way to parallelize sequential programs without the n...
Kunle Olukotun, Lance Hammond, Mark Willey
ICPP
1996
IEEE
15 years 9 months ago
Restructuring Programs for High-Speed Computers with Polaris
The ability to automatically parallelize standard programming languages results in program portability across a wide range of machine architectures. It is the goal of the Polaris ...
William Blume, Rudolf Eigenmann, Keith Faigin, Joh...
MABS
2000
Springer
15 years 8 months ago
Agent-Based Social Simulation with Coalitions in Social Reasoning
There is a growing belief that the agents' cognitive structures play a central role on the enhancement of predicative capacities of decision-making strategies. This paper anal...
Nuno David, Jaime Simão Sichman, Helder Coe...
ASPDAC
2007
ACM
98views Hardware» more  ASPDAC 2007»
15 years 6 months ago
A Software Technique to Improve Yield of Processor Chips in Presence of Ultra-Leaky SRAM Cells Caused by Process Variation
- Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower threshold voltage and its increased variation. Such leaky transistors may e...
Maziar Goudarzi, Tohru Ishihara, Hiroto Yasuura