Sciweavers

357 search results - page 21 / 72
» From C Programs to the Configure-Execute Model
Sort
View
FMICS
2010
Springer
13 years 8 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó
JUCS
2008
132views more  JUCS 2008»
13 years 7 months ago
Trading Links and Paths on a Communication Bandwidth Market
: This paper presents a novel market model for balancing communication bandwidth trade. The distinguishing characteristic of the model is that it assumes that market players can pl...
Wojciech Stanczuk, Józef Lubacz, Eugeniusz ...
ASPLOS
2010
ACM
13 years 11 months ago
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...
WCRE
2003
IEEE
14 years 1 months ago
Extracting an Explicitly Data-Parallel Representation of Image-Processing Programs
Our research goal is to retarget image processing programs written in sequential languages (e.g., C) to architectures with data-parallel processing capabilities. Image processing ...
Lewis B. Baumstark Jr., Murat Guler, Linda M. Will...
SIAMIS
2010
378views more  SIAMIS 2010»
13 years 2 months ago
Global Interactions in Random Field Models: A Potential Function Ensuring Connectedness
Markov random field (MRF) models, including conditional random field models, are popular in computer vision. However, in order to be computationally tractable, they are limited to ...
Sebastian Nowozin, Christoph H. Lampert