Sciweavers

2512 search results - page 433 / 503
» Software Transactional Memory
Sort
View
ICFP
2006
ACM
14 years 7 months ago
Modular development of certified program verifiers with a proof assistant
I report on an experience using the Coq proof assistant to develop a program verification tool with a machine-checkable proof of full correctness. The verifier is able to prove me...
Adam J. Chlipala
SAC
2010
ACM
14 years 2 months ago
Referrer graph: a low-cost web prediction algorithm
This paper presents the Referrer Graph (RG) web prediction algorithm as a low-cost solution to predict next web user accesses. RG is aimed at being used in a real web system with ...
B. de la Ossa, Ana Pont, Julio Sahuquillo, Jos&eac...
HOST
2009
IEEE
14 years 2 months ago
Detecting Trojan Circuit Attacks
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
Gedare Bloom, Bhagirath Narahari, Rahul Simha
ICNS
2009
IEEE
14 years 2 months ago
Analysis and Experimental Evaluation of Data Plane Virtualization with Xen
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrast...
Fabienne Anhalt, Pascale Vicat-Blanc Primet
IROS
2009
IEEE
198views Robotics» more  IROS 2009»
14 years 2 months ago
Scalable learning for object detection with GPU hardware
Abstract— We consider the problem of robotic object detection of such objects as mugs, cups, and staplers in indoor environments. While object detection has made significant pro...
Adam Coates, Paul Baumstarck, Quoc V. Le, Andrew Y...