Sciweavers

1580 search results - page 259 / 316
» Non-Interference Through Determinism
Sort
View
PPOPP
2010
ACM
14 years 7 months ago
Is transactional programming actually easier?
Chip multi-processors (CMPs) have become ubiquitous, while tools that ease concurrent programming have not. The promise of increased performance for all applications through ever ...
Christopher J. Rossbach, Owen S. Hofmann, Emmett W...
ICCAD
2008
IEEE
140views Hardware» more  ICCAD 2008»
14 years 6 months ago
Algorithms for simultaneous consideration of multiple physical synthesis transforms for timing closure
We propose a post-placement physical synthesis algorithm that can apply multiple circuit synthesis and placement transforms on a placed circuit to improve the critical path delay ...
Huan Ren, Shantanu Dutt
SOSP
2003
ACM
14 years 6 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
CSCW
2010
ACM
14 years 6 months ago
Are you having difficulty?
It would be useful if software engineers/instructors could be aware that remote team members/students are having difficulty with their programming tasks. We have developed an appr...
Jason Carter, Prasun Dewan
CVPR
2010
IEEE
14 years 6 months ago
Segmenting Video Into Classes of Algorithm-Suitability
Given a set of algorithms, which one(s) should you apply to, i) compute optical flow, or ii) perform feature matching? Would looking at the sequence in question help you decide? I...
Oisin Mac Aodha, Gabriel Brostow, marc Pollefeys