Sciweavers

1629 search results - page 260 / 326
» Infeasible Code Detection
Sort
View
OSDI
2000
ACM
13 years 11 months ago
Knit: Component Composition for Systems Software
Knit is a new component definition and linking language for systems code. Knit helps make C code more understandable and reusable by third parties, helps eliminate much of the per...
Alastair Reid, Matthew Flatt, Leigh Stoller, Jay L...
IVC
2006
187views more  IVC 2006»
13 years 10 months ago
Dynamics of facial expression extracted automatically from video
We present a systematic comparison of machine learning methods applied to the problem of fully automatic recognition of facial expressions, including AdaBoost, support vector mach...
Gwen Littlewort, Marian Stewart Bartlett, Ian R. F...
TCOM
2008
80views more  TCOM 2008»
13 years 10 months ago
Power reduction techniques for multiple-subcarrier modulated diffuse wireless optical channels
In this paper, two novel techniques are proposed to reduce the average optical power in wireless optical multiplesubcarrier modulated (MSM) systems, namely in-band trellis coding a...
Weiwei Kang, Steve Hranilovic
RV
2010
Springer
177views Hardware» more  RV 2010»
13 years 8 months ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
ISCA
2012
IEEE
281views Hardware» more  ISCA 2012»
12 years 19 days ago
LOT-ECC: Localized and tiered reliability mechanisms for commodity memory systems
Memory system reliability is a serious and growing concern in modern servers. Existing chipkill-level memory protection mechanisms suffer from several drawbacks. They activate a l...
Aniruddha N. Udipi, Naveen Muralimanohar, Rajeev B...