Sciweavers

1466 search results - page 195 / 294
» Completeness of the Authentication Tests
Sort
View
POPL
2010
ACM
14 years 5 months ago
A simple, verified validator for software pipelining
Software pipelining is a loop optimization that overlaps the execution of several iterations of a loop to expose more instruction-level parallelism. It can result in first-class p...
Jean-Baptiste Tristan, Xavier Leroy
ICCAD
2008
IEEE
98views Hardware» more  ICCAD 2008»
14 years 4 months ago
Scalable and scalably-verifiable sequential synthesis
This paper describes an efficient implementation of an effective sequential synthesis operation that uses induction to detect and merge sequentially-equivalent nodes. State-encodi...
Alan Mishchenko, Michael L. Case, Robert K. Brayto...
IUI
2009
ACM
14 years 4 months ago
Subobject detection through spatial relationships on mobile phones
We present a novel image classification technique for detecting multiple objects (called subobjects) in a single image. In addition to image classifiers, we apply spatial relati...
Benjamin Brombach, Erich Bruns, Oliver Bimber
CHI
2010
ACM
14 years 2 months ago
How does search behavior change as search becomes more difficult?
Search engines make it easy to check facts online, but finding some specific kinds of information sometimes proves to be difficult. We studied the behavioral signals that suggest ...
Anne Aula, Rehan M. Khan, Zhiwei Guan
SAC
2010
ACM
14 years 2 months ago
Extraction of component-environment interaction model using state space traversal
Scalability of software engineering methods can be improved by application of the methods to individual components instead of complete systems. This is, however, possible only if ...
Pavel Parizek, Nodir Yuldashev