Sciweavers

302 search results - page 32 / 61
» Deriving input syntactic structure from execution
Sort
View
OSDI
2004
ACM
14 years 10 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
ISLPED
2004
ACM
124views Hardware» more  ISLPED 2004»
14 years 3 months ago
The design of a low power asynchronous multiplier
In this paper we investigate the statistics of multiplier operands and identify two characteristics of their distribution that have important consequences for the design of low po...
Yijun Liu, Stephen B. Furber
ICIP
2005
IEEE
14 years 11 months ago
A probabilistic model for robust face alignment in videos
A new approach for localizing facial structure in videos is proposed in this paper by modeling shape alignment dynamically. The approach makes use of the spatial-temporal continuit...
Wei Zhang, Yi Zhou, Xiaoou Tang, Junhui Deng
ICSM
2003
IEEE
14 years 3 months ago
DART: A Framework for Regression Testing "Nightly/daily Builds" of GUI Applications
“Nightly/daily building and smoke testing” have become widespread since they often reveal bugs early in the software development process. During these builds, software is comp...
Atif M. Memon, Ishan Banerjee, Nada Hashmi, Adithy...
EMSOFT
2006
Springer
14 years 1 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing