Sciweavers

36320 search results - page 42 / 7264
» From Code to Models
Sort
View
122
Voted
ISVLSI
2007
IEEE
139views VLSI» more  ISVLSI 2007»
15 years 8 months ago
Automatic Retargeting of Binary Utilities for Embedded Code Generation
Contemporary SoC design involves the proper selection of cores from a reference platform. Such selection implies the design exploration of alternative CPUs, which requires the gen...
Alexandro Baldassin, Paulo Centoducatte, Sandro Ri...
222
Voted
POPL
2009
ACM
16 years 3 months ago
The semantics of x86-CC multiprocessor machine code
Multiprocessors are now dominant, but real multiprocessors do not provide the sequentially consistent memory that is assumed by most work on semantics and verification. Instead, t...
Susmit Sarkar, Peter Sewell, Francesco Zappa Narde...
NECO
2000
133views more  NECO 2000»
15 years 2 months ago
Neural Coding: Higher-Order Temporal Patterns in the Neurostatistics of Cell Assemblies
Recent advances in the technology of multi-unit recordings make it possible to test Hebb's hypothesis that neurons do not function in isolation but are organized in assemblie...
Laura Martignon, Gustavo Deco, Kathryn B. Laskey, ...
MODELS
2010
Springer
15 years 28 days ago
Inferring Meta-models for Runtime System Data from the Clients of Management APIs
Abstract. A new trend in runtime system monitoring is to utilize MOFbased techniques in analyzing the runtime system data. Approaches and tools have been proposed to automatically ...
Hui Song, Gang Huang, Yingfei Xiong, Franck Chauve...
105
Voted
CSFW
2004
IEEE
15 years 6 months ago
From Stack Inspection to Access Control: A Security Analysis for Libraries
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
Frédéric Besson, Tomasz Blanc, C&eac...