Sciweavers

5810 search results - page 1096 / 1162
» An Approach to Programming Based on Concepts
Sort
View
ASPLOS
2008
ACM
15 years 6 months ago
Hardware counter driven on-the-fly request signatures
Today's processors provide a rich source of statistical information on application execution through hardware counters. In this paper, we explore the utilization of these sta...
Kai Shen, Ming Zhong, Sandhya Dwarkadas, Chuanpeng...
142
Voted
ICSE
2010
IEEE-ACM
15 years 6 months ago
SMT-based bounded model checking for multi-threaded software in embedded systems
The transition from single-core to multi-core processors has made multi-threaded software an important subject over the last years in computer-aided verification. Model checkers ...
Lucas Cordeiro
ASPLOS
2006
ACM
15 years 6 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
INTERACT
2007
15 years 6 months ago
CubeExplorer: An Evaluation of Interaction Techniques in Architectural Education
During the early stages of architectural training, tangibility plays an important role in developing spatial awareness. In such contexts, tangible user interfaces are believed to p...
Hyunyoung Song, François Guimbretièr...
BMCBI
2010
175views more  BMCBI 2010»
15 years 4 months ago
Towards high performance computing for molecular structure prediction using IBM Cell Broadband Engine - an implementation perspe
Background: RNA structure prediction problem is a computationally complex task, especially with pseudo-knots. The problem is well-studied in existing literature and predominantly ...
S. P. T. Krishnan, Sim Sze Liang, Bharadwaj Veerav...
« Prev « First page 1096 / 1162 Last » Next »