Sciweavers

396 search results - page 54 / 80
» Argument Controlled Profiling
Sort
View
EUROMICRO
1998
IEEE
13 years 12 months ago
The Latency Hiding Effectiveness of Decoupled Access/Execute Processors
Several studies have demonstrated that out-of-order execution processors may not be the most adequate organization for wide issue processors due to the increasing penalties that w...
Joan-Manuel Parcerisa, Antonio González
CGO
2004
IEEE
13 years 11 months ago
Optimizing Translation Out of SSA Using Renaming Constraints
Static Single Assignment form is an intermediate representation that uses instructions to merge values at each confluent point of the control flow graph. instructions are not ma...
Fabrice Rastello, François de Ferriè...
CAISE
2006
Springer
13 years 11 months ago
Deviational Analyses for Validating Regulations on Real Systems
Deviational analysis is a traditional way of exploring the safety of systems. The results of deviational analysis contribute to traditional safety cases and safety arguments. We ex...
Fiona Polack, Thitima Srivatanakul, Tim Kelly, Joh...
DBSEC
2008
137views Database» more  DBSEC 2008»
13 years 9 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
LREC
2010
179views Education» more  LREC 2010»
13 years 9 months ago
Building a Bank of Semantically Encoded Narratives
We propose a methodology for a novel type of discourse annotation whose model is tuned to the analysis of a text as narrative. This is intended to be the basis of a "story ba...
David K. Elson, Kathleen McKeown