Sciweavers

47 search results - page 8 / 10
» A study of common pitfalls in simple multi-threaded programs
Sort
View
ICCAD
2006
IEEE
141views Hardware» more  ICCAD 2006»
14 years 3 months ago
A code refinement methodology for performance-improved synthesis from C
Although many recent advances have been made in hardware synthesis techniques from software programming languages such as C, the performance of synthesized hardware commonly suffe...
Greg Stitt, Frank Vahid, Walid A. Najjar
TPHOL
2007
IEEE
14 years 1 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
BMCBI
2006
140views more  BMCBI 2006»
13 years 7 months ago
SNP-PHAGE - High throughput SNP discovery pipeline
Background: Single nucleotide polymorphisms (SNPs) as defined here are single base sequence changes or short insertion/deletions between or within individuals of a given species. ...
Lakshmi K. Matukumalli, John J. Grefenstette, Davi...
BMCBI
2005
124views more  BMCBI 2005»
13 years 7 months ago
ErmineJ: Tool for functional analysis of gene expression data sets
Background: It is common for the results of a microarray study to be analyzed in the context of biologically-motivated groups of genes such as pathways or Gene Ontology categories...
Homin K. Lee, William Braynen, Kiran Keshav, Paul ...
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...