Sciweavers

2414 search results - page 376 / 483
» Server-Level Power Control
Sort
View
SIGSOFT
2009
ACM
14 years 10 months ago
Symbolic pruning of concurrent program executions
We propose a new algorithm for verifying concurrent programs, which uses concrete executions to partition the program into a set of lean partitions called concurrent trace program...
Chao Wang, Swarat Chaudhuri, Aarti Gupta, Yu Yang
ISBI
2006
IEEE
14 years 10 months ago
Sketch initialized Snakes for rapid, accurate and repeatable interactive medical image segmentation
We combine a pen and pressure-sensitive tablet input device, and a sketch-based user initialization process, with a general subdivisioncurve Snake to create an intuitive, fast, ac...
Tim McInerney, M. Reza Akhavan Sharif
CCS
2009
ACM
14 years 9 months ago
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
In this paper, we re-visit the problem of unconditionally secure message transmission (USMT) from a sender S to a receiver R, who are part of a distributed synchronous network, mo...
Kannan Srinathan, Arpita Patra, Ashish Choudhary, ...
HPCA
2009
IEEE
14 years 9 months ago
Dynamic hardware-assisted software-controlled page placement to manage capacity allocation and sharing within large caches
In future multi-cores, large amounts of delay and power will be spent accessing data in large L2/L3 caches. It has been recently shown that OS-based page coloring allows a non-uni...
Manu Awasthi, Kshitij Sudan, Rajeev Balasubramonia...
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 9 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay