Sciweavers

1821 search results - page 218 / 365
» Security-Aware Program Transformations
Sort
View
EUROSYS
2011
ACM
13 years 1 months ago
Symbolic crosschecking of floating-point and SIMD code
We present an effective technique for crosschecking an IEEE 754 floating-point program and its SIMD-vectorized version, implemented in KLEE-FP, an extension to the KLEE symbolic ...
Peter Collingbourne, Cristian Cadar, Paul H. J. Ke...
DOCENG
2011
ACM
12 years 9 months ago
Interoperable metadata semantics with meta-metadata: a use case integrating search engines
A use case involving integrating results from search engines illustrates how the meta-metadata language facilitates interoperable metadata semantics. Formal semantics can be hard ...
Yin Qu, Andruid Kerne, Andrew M. Webb, Aaron Herst...
INFOCOM
2012
IEEE
12 years 2 days ago
Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption
—Conserving network-wide energy consumption is becoming an increasingly important concern for network operators. In this work, we study network-wide energy conservation problem w...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou
DAC
2012
ACM
12 years 1 days ago
On software design for stochastic processors
Much recent research [8, 6, 7] suggests significant power and energy benefits of relaxing correctness constraints in future processors. Such processors with relaxed constraints ...
Joseph Sloan, John Sartori, Rakesh Kumar
TFM
2009
Springer
252views Formal Methods» more  TFM 2009»
14 years 4 months ago
Abstraction and Modelling: A Complementary Partnership
action and Modelling - a complementary partnership” 10h30 – 11h 00 Coffee break 11h-12h30 Session 1 “Model Transformation: Foundations” Algebraic models for bidirectional m...
Jeffrey Kramer