Sciweavers

1239 search results - page 162 / 248
» Control Generation for Logic Programs
Sort
View
CSFW
2011
IEEE
12 years 7 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
DAC
2005
ACM
14 years 9 months ago
Structural search for RTL with predicate learning
We present an efficient search strategy for satisfiability checking on circuits represented at the register-transfer-level (RTL). We use the RTL circuit structure by extending con...
Ganapathy Parthasarathy, Madhu K. Iyer, Kwang-Ting...
COGSCI
2006
86views more  COGSCI 2006»
13 years 8 months ago
Deferred Interpretations: Why Starting Dickens is Taxing but Reading Dickens Isn't
Comprehenders often need to go beyond conventional word senses to obtain an appropriate interpretation of an expression. We report an experiment examining the processing of standa...
Brian McElree, Steven Frisson, Martin J. Pickering
SPIN
2010
Springer
13 years 6 months ago
Combining SPIN with ns-2 for Protocol Optimization
In the field of communication networks, protocol engineers usually employ several tools focused on specific kinds of analysis, such as performance or correctness. This paper pres...
Pedro Merino, Alberto Salmeron
TCS
2010
13 years 6 months ago
Detecting synchronisation of biological oscillators by model checking
We define a subclass of timed automata, called oscillator timed automata, suitable to model biological oscillators. Coupled biological oscillators may synchronise, as emerging be...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...