Sciweavers

10819 search results - page 2148 / 2164
» Addition and multiplication of sets
Sort
View
HUC
2010
Springer
13 years 5 months ago
Locaccino: a privacy-centric location sharing application
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researc...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
ICCAD
2010
IEEE
148views Hardware» more  ICCAD 2010»
13 years 5 months ago
Trace signal selection to enhance timing and logic visibility in post-silicon validation
Trace buffer technology allows tracking the values of a few number of state elements inside a chip within a desired time window, which is used to analyze logic errors during post-s...
Hamid Shojaei, Azadeh Davoodi
ICIP
2010
IEEE
13 years 5 months ago
Barcode-based calibration of a 1-D blur restoration pipeline
: External Posting Date: October 21, 2010 [Fulltext] Approved for External Publication Internal Posting Date: October 21, 2010 [Fulltext] Barcode-Based Calibration of a 1-D Blur R...
Matthew Gaubatz, Steven J. Simske
LCTRTS
2010
Springer
13 years 5 months ago
Compiler directed network-on-chip reliability enhancement for chip multiprocessors
Chip multiprocessors (CMPs) are expected to be the building blocks for future computer systems. While architecting these emerging CMPs is a challenging problem on its own, program...
Ozcan Ozturk, Mahmut T. Kandemir, Mary Jane Irwin,...
MICRO
2010
IEEE
161views Hardware» more  MICRO 2010»
13 years 5 months ago
AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection
A particularly insidious type of concurrency bug is atomicity violations. While there has been substantial work on automatic detection of atomicity violations, each existing techn...
Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas
« Prev « First page 2148 / 2164 Last » Next »