Sciweavers

1182 search results - page 121 / 237
» Reducing the Overhead of Dynamic Analysis
Sort
View
131
Voted
JSAC
2008
133views more  JSAC 2008»
15 years 3 months ago
Distributed Rule-Regulated Spectrum Sharing
Dynamic spectrum access is a promising technique to use spectrum efficiently. Without being restricted to any prefixed spectrum bands, nodes choose operating spectrum ondemand. Suc...
Lili Cao, Haitao Zheng
NFM
2011
252views Formal Methods» more  NFM 2011»
14 years 10 months ago
Call Invariants
Program verifiers based on first-order theorem provers model the program heap as a collection of mutable maps. In such verifiers, preserving unmodified facts about the heap acr...
Shuvendu K. Lahiri, Shaz Qadeer
150
Voted
ISCA
2011
IEEE
271views Hardware» more  ISCA 2011»
14 years 7 months ago
CRIB: consolidated rename, issue, and bypass
Conventional high-performance processors utilize register renaming and complex broadcast-based scheduling logic to steer instructions into a small number of heavily-pipelined exec...
Erika Gunadi, Mikko H. Lipasti
147
Voted
JSAC
2011
184views more  JSAC 2011»
14 years 10 months ago
Goodput Enhancement of VANETs in Noisy CSMA/CA Channels
— The growing interest in vehicular ad hoc networks (VANETs) enables decentralized traveler information systems to become more feasible and effective in Intelligent Transportatio...
Yusun Chang, Christopher P. Lee, John A. Copeland
CODES
2007
IEEE
15 years 9 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...