Sciweavers

1079 search results - page 76 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
CCS
2005
ACM
14 years 2 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
FMSD
2007
110views more  FMSD 2007»
13 years 9 months ago
Exploiting interleaving semantics in symbolic state-space generation
Symbolic techniques based on Binary Decision Diagrams (BDDs) are widely employed for reasoning about temporal properties of hardware circuits and synchronous controllers. However, ...
Gianfranco Ciardo, Gerald Lüttgen, Andrew S. ...
FPL
2009
Springer
85views Hardware» more  FPL 2009»
14 years 1 months ago
Generating high-performance custom floating-point pipelines
Custom operators, working at custom precisions, are a key ingredient to fully exploit the FPGA flexibility advantage for high-performance computing. Unfortunately, such operators...
Florent de Dinechin, Cristian Klein, Bogdan Pasca
DAGM
2003
Springer
14 years 2 months ago
A Generative Model Based Approach to Motion Segmentation
We address the question of how to choose between different likelihood functions for motion estimation. To this end, we formulate motion estimation as a problem of Bayesian inferen...
Daniel Cremers, Alan L. Yuille
FDL
2007
IEEE
14 years 1 months ago
A Metamodeling based Framework for Architectural Modeling and Simulator Generation
Functional validation of microprocessors is growing in complexity in current and future microprocessors. The informal specification document from which the various collaterals are ...
Deepak Mathaikutty, Ajit Dingankar, Sandeep K. Shu...