Sciweavers

36 search results - page 5 / 8
» Path slicing
Sort
View
MP
2008
92views more  MP 2008»
13 years 6 months ago
Invariance and efficiency of convex representations
We consider two notions for the representations of convex cones: G-representation and liftedG-representation. The former represents a convex cone as a slice of another; the latter...
Chek Beng Chua, Levent Tunçel
KBSE
2000
IEEE
13 years 11 months ago
Model Checking Programs
The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it eas...
Willem Visser, Klaus Havelund, Guillaume P. Brat, ...
SASP
2008
IEEE
101views Hardware» more  SASP 2008»
14 years 1 months ago
Custom Processor Core Construction from C Code
—In this paper we present a method for construction of application specific processor cores from a given C code. Our approach consists of three phases. We start by quantifying t...
Jelena Trajkovic, Daniel D. Gajski
FPGA
2004
ACM
121views FPGA» more  FPGA 2004»
14 years 2 days ago
Divide and concatenate: a scalable hardware architecture for universal MAC
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
Bo Yang, Ramesh Karri, David A. McGrew
SOSP
2007
ACM
14 years 3 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...