Sciweavers

1687 search results - page 142 / 338
» Which pointer analysis should I use
Sort
View
PLDI
2012
ACM
13 years 6 months ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
SAC
2004
ACM
15 years 9 months ago
Axes-based visualizations with radial layouts
In the analysis of multidimensional data sets questions involving detection of extremal events, correlations, patterns and trends play an increasingly important role in a variety ...
Christian Tominski, James Abello, Heidrun Schumann
DAC
1998
ACM
16 years 5 months ago
Figures of Merit to Characterize the Importance of On-Chip Inductance
- A closed form solution for the output signal of a CMOS inverter driving an RLC transmission line is presented. This solution is based on the alpha power law for deep submicromete...
Yehea I. Ismail, Eby G. Friedman, José Luis...
COSIT
2007
Springer
136views GIS» more  COSIT 2007»
15 years 10 months ago
Spatial Semantics in Difference Spaces
Higher level semantics are considered useful in the geospatial domain, yet there is no general consensus on the form these semantics should take. Indeed, knowledge representation p...
Vlad Tanasescu
IJCAI
1997
15 years 5 months ago
An Achievement Test for Knowledge-Based Systems: QUEM
This paper describes QUEM, a method for assessing the skill level of a knowledge-based system based on the quality of the solutions it produces. QUEM is demonstrated by using it t...
Caroline C. Hayes, Michael I. Parzen