Sciweavers

19 search results - page 3 / 4
» Generalizing Redundancy Elimination in Checking Sequences
Sort
View
ISCA
2005
IEEE
117views Hardware» more  ISCA 2005»
14 years 29 days ago
Store Vulnerability Window (SVW): Re-Execution Filtering for Enhanced Load Optimization
The load-store unit is a performance critical component of a dynamically-scheduled processor. It is also a complex and non-scalable component. Several recently proposed techniques...
Amir Roth
JCS
2010
80views more  JCS 2010»
13 years 2 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 7 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
TSMC
2002
80views more  TSMC 2002»
13 years 7 months ago
A feedforward neural network controlling the movement of a 3-DOF finger
This paper describes the dynamic control of a 3 degree of freedom (DOF) finger emulating a human finger for reaching a desired fingertip position in space. The control consists of ...
Emanuele Lindo Secco, Giovanni Magenes
ASPLOS
2010
ACM
13 years 10 months ago
Orthrus: efficient software integrity protection on multi-cores
This paper proposes an efficient hardware/software system that significantly enhances software security through diversified replication on multi-cores. Recent studies show that a ...
Ruirui Huang, Daniel Y. Deng, G. Edward Suh