Sciweavers

1821 search results - page 144 / 365
» Security-Aware Program Transformations
Sort
View
ICDCS
2003
IEEE
14 years 2 months ago
Enhancing The Fault-Tolerance of Nonmasking Programs
In this paper, we focus on automated techniques to enhance the fault-tolerance of a nonmasking fault-tolerant program to masking. A masking program continually satisfies its spec...
Sandeep S. Kulkarni, Ali Ebnenasir
IFIP
1997
Springer
14 years 21 days ago
Waiting time distributions in a two-queue model with mixed exhaustive and gated-type K-limited services
We deal with a two-queue model with mixed exhaustive and gated-type K-limited services. This model can achieve various degrees of priority in each queue by varying the value of K....
Toshihisa Ozawa
ICASSP
2010
IEEE
13 years 9 months ago
A compressive sensing image compression algorithm using quantized DCT and noiselet information
Inspired by recent theoretical advances in compressive sensing (CS), we propose a new framework that combines the classical local discrete cosine transform used in image compressi...
Jiangtao Wen, Zhuoyuan Chen, Yuxing Han, John D. V...
PEPM
2009
ACM
14 years 6 months ago
Bidirectional data-flow analyses, type-systematically
We show that a wide class of bidirectional data-flow analyses and program optimizations based on them admit declarative descriptions in the form of type systems. The salient feat...
Maria João Frade, Ando Saabas, Tarmo Uustal...
ICFP
2006
ACM
14 years 9 months ago
Modular development of certified program verifiers with a proof assistant
I report on an experience using the Coq proof assistant to develop a program verification tool with a machine-checkable proof of full correctness. The verifier is able to prove me...
Adam J. Chlipala