Sciweavers

12637 search results - page 2449 / 2528
» Security for Extensible Systems
Sort
View
POPL
2010
ACM
14 years 6 months ago
On the Verification Problem for Weak Memory Models
We address the verification problem of finite-state concurrent programs running under weak memory models. These models capture the reordering of program (read and write) operation...
Ahmed Bouajjani, Madanlal Musuvathi, Mohamed Faouz...
EUROSYS
2007
ACM
14 years 6 months ago
Comparing the performance of web server architectures
In this paper, we extensively tune and then compare the performance of web servers based on three different server architectures. The µserver utilizes an event-driven architectur...
David Pariag, Tim Brecht, Ashif S. Harji, Peter A....
EUROGRAPHICS
2010
Eurographics
14 years 6 months ago
Mesh Decomposition with Cross-Boundary Brushes
We present a new intuitive UI, which we call cross-boundary brushes, for interactive mesh decomposition. The user roughly draws one or more strokes across a desired cut and our sy...
Youyi Zheng and Chiew-Lan Tai
ICCAD
2003
IEEE
109views Hardware» more  ICCAD 2003»
14 years 5 months ago
Large-Scale Circuit Placement: Gap and Promise
Placement is one of the most important steps in the RTLto-GDSII synthesis process, as it directly defines the interconnects, which have become the bottleneck in circuit and syste...
Jason Cong, Tim Kong, Joseph R. Shinnerl, Min Xie,...
IUI
2010
ACM
14 years 5 months ago
Facilitating exploratory search by model-based navigational cues
We present an extension of a computational cognitive model of social tagging and exploratory search called the semantic imitation model. The model assumes a probabilistic represen...
Wai-Tat Fu, Thomas George Kannampallil, Ruogu Kang
« Prev « First page 2449 / 2528 Last » Next »