Sciweavers

6266 search results - page 1245 / 1254
» New results on the computability and complexity of points - ...
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
ASPLOS
2010
ACM
14 years 2 months ago
Shoestring: probabilistic soft error reliability on the cheap
Aggressive technology scaling provides designers with an ever increasing budget of cheaper and faster transistors. Unfortunately, this trend is accompanied by a decline in individ...
Shuguang Feng, Shantanu Gupta, Amin Ansari, Scott ...
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
14 years 2 months ago
An MDE methodology for the development of high-integrity real-time systems
—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Silvia Mazzini, Stefano Puri, Tullio Vardanega
IISWC
2009
IEEE
14 years 2 months ago
On the (dis)similarity of transactional memory workloads
— Programming to exploit the resources in a multicore system remains a major obstacle for both computer and software engineers. Transactional memory offers an attractive alternat...
Clay Hughes, James Poe, Amer Qouneh, Tao Li
ICASSP
2008
IEEE
14 years 1 months ago
Filter bank design based on minimization of individual aliasing terms for minimum mutual information subband adaptive beamformin
This paper presents new filter bank design methods for subband adaptive beamforming. In this work, we design analysis and synthesis prototypes for modulated filter banks so as t...
Ken'ichi Kumatani, John W. McDonough, S. Schachl, ...
« Prev « First page 1245 / 1254 Last » Next »