Sciweavers

181 search results - page 13 / 37
» Program Slicing and Data Provenance
Sort
View
MICCAI
2004
Springer
14 years 11 months ago
A Semi-automatic Endocardial Border Detection Method for 4D Ultrasound Data
We propose a semi-automatic endocardial border detection method for 3D+T cardiac ultrasound data based on pattern matching and dynamic programming, operating on 2D slices of the 3D...
Boudewijn J. Krenning, Charles T. Lancée, G...
ET
2010
83views more  ET 2010»
13 years 9 months ago
Experience with Widening Based Equivalence Checking in Realistic Multimedia Systems
—Designers often apply manual or semi-automatic loop and data transformations on array and loop intensive programs to improve performance. For the class of static affine program...
Sven Verdoolaege, Martin Palkovic, Maurice Bruynoo...
ACSAC
2006
IEEE
14 years 2 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
ACMMSP
2006
ACM
247views Hardware» more  ACMMSP 2006»
14 years 4 months ago
A flexible data to L2 cache mapping approach for future multicore processors
This paper proposes and studies a distributed L2 cache management approach through page-level data to cache slice mapping in a future processor chip comprising many cores. L2 cach...
Lei Jin, Hyunjin Lee, Sangyeun Cho
SIGSOFT
2007
ACM
14 years 11 months ago
Finding bugs efficiently with a SAT solver
We present an approach for checking code against rich specifications, based on existing work that consists of encoding the program in a relational logic and using a constraint sol...
Julian Dolby, Mandana Vaziri, Frank Tip