Sciweavers

4270 search results - page 852 / 854
» A Permutation Approach to Validation
Sort
View
PLDI
2012
ACM
11 years 9 months ago
Automated error diagnosis using abductive inference
When program verification tools fail to verify a program, either the program is buggy or the report is a false alarm. In this situation, the burden is on the user to manually cla...
Isil Dillig, Thomas Dillig, Alex Aiken
TOG
2012
187views Communications» more  TOG 2012»
11 years 9 months ago
CrossShade: shading concept sketches using cross-section curves
We facilitate the creation of 3D-looking shaded production drawings from concept sketches. The key to our approach is a class of commonly used construction curves known as cross-s...
Cloud Shao, Adrien Bousseau, Alla Sheffer, Karan S...
TON
2012
11 years 9 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
ISCA
2012
IEEE
243views Hardware» more  ISCA 2012»
11 years 9 months ago
Lane decoupling for improving the timing-error resiliency of wide-SIMD architectures
A significant portion of the energy dissipated in modern integrated circuits is consumed by the overhead associated with timing guardbands that ensure reliable execution. Timing ...
Evgeni Krimer, Patrick Chiang, Mattan Erez
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
11 years 9 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan